Analysis
-
max time kernel
44s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
15-09-2022 03:36
Behavioral task
behavioral1
Sample
ee218a6eac8b9e76ab9b704c84d2f4f0449264e67c55dd5c993cbe6de5ccbee7.exe
Resource
win7-20220901-en
windows7-x64
6 signatures
300 seconds
General
-
Target
ee218a6eac8b9e76ab9b704c84d2f4f0449264e67c55dd5c993cbe6de5ccbee7.exe
-
Size
4.0MB
-
MD5
fa6555ed1677ca8cea97cdc7150fdbf2
-
SHA1
7a00ca8196400f87d75e74a254d5f11d156dc091
-
SHA256
ee218a6eac8b9e76ab9b704c84d2f4f0449264e67c55dd5c993cbe6de5ccbee7
-
SHA512
1e476a7381c187ea819de5284d0fd0d409ea67c3c5532a2bfde829bbeb490cb37e5f4746010c7b634586227a19b27dc826614ce73f45b781ad1403542627c97b
-
SSDEEP
98304:sssVESQapUN9eRKe13H98LCpjTiOE4mylWpXkZg:BA4iX9eCp6OEhylD
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/2028-54-0x00000000002C0000-0x0000000001089000-memory.dmp family_ytstealer behavioral1/memory/2028-57-0x00000000002C0000-0x0000000001089000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/2028-54-0x00000000002C0000-0x0000000001089000-memory.dmp upx behavioral1/memory/2028-57-0x00000000002C0000-0x0000000001089000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2028 ee218a6eac8b9e76ab9b704c84d2f4f0449264e67c55dd5c993cbe6de5ccbee7.exe 2028 ee218a6eac8b9e76ab9b704c84d2f4f0449264e67c55dd5c993cbe6de5ccbee7.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2028 wrote to memory of 1756 2028 ee218a6eac8b9e76ab9b704c84d2f4f0449264e67c55dd5c993cbe6de5ccbee7.exe 28 PID 2028 wrote to memory of 1756 2028 ee218a6eac8b9e76ab9b704c84d2f4f0449264e67c55dd5c993cbe6de5ccbee7.exe 28 PID 2028 wrote to memory of 1756 2028 ee218a6eac8b9e76ab9b704c84d2f4f0449264e67c55dd5c993cbe6de5ccbee7.exe 28 PID 1756 wrote to memory of 1368 1756 cmd.exe 30 PID 1756 wrote to memory of 1368 1756 cmd.exe 30 PID 1756 wrote to memory of 1368 1756 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee218a6eac8b9e76ab9b704c84d2f4f0449264e67c55dd5c993cbe6de5ccbee7.exe"C:\Users\Admin\AppData\Local\Temp\ee218a6eac8b9e76ab9b704c84d2f4f0449264e67c55dd5c993cbe6de5ccbee7.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\ee218a6eac8b9e76ab9b704c84d2f4f0449264e67c55dd5c993cbe6de5ccbee7.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1368
-
-