Analysis
-
max time kernel
36s -
max time network
39s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
15-09-2022 03:22
Behavioral task
behavioral1
Sample
119e5bf72d68c4881a5dfb0a40c85c32adb85cc7f09071c92fdf03b736d66165.exe
Resource
win7-20220812-en
windows7-x64
7 signatures
300 seconds
General
-
Target
119e5bf72d68c4881a5dfb0a40c85c32adb85cc7f09071c92fdf03b736d66165.exe
-
Size
4.0MB
-
MD5
2c90b9bd2f5103e4df4d5232ddf4fd33
-
SHA1
3eb10051b0159a5a0d44432e2fe2abf33eb1c931
-
SHA256
119e5bf72d68c4881a5dfb0a40c85c32adb85cc7f09071c92fdf03b736d66165
-
SHA512
dad76f2c6b57840a34cb55f20eec964114b5718f20deeeab0d0f7a70f7a413b46d9ead6bbdbcb92f9751e69ff858897ea98d822ec972bcd1a7adaaed5a12e002
-
SSDEEP
98304:aCeeAAnUp77XRvoo9us1vEFk9rAN3HEq8b0ZM37k:aCvAAqjf9d1vNE3HEvb0ZMr
Malware Config
Signatures
-
YTStealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/752-54-0x00000000002C0000-0x0000000001089000-memory.dmp family_ytstealer behavioral1/memory/752-56-0x00000000002C0000-0x0000000001089000-memory.dmp family_ytstealer -
Processes:
resource yara_rule behavioral1/memory/752-54-0x00000000002C0000-0x0000000001089000-memory.dmp upx behavioral1/memory/752-56-0x00000000002C0000-0x0000000001089000-memory.dmp upx -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1680 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
119e5bf72d68c4881a5dfb0a40c85c32adb85cc7f09071c92fdf03b736d66165.exepid process 752 119e5bf72d68c4881a5dfb0a40c85c32adb85cc7f09071c92fdf03b736d66165.exe 752 119e5bf72d68c4881a5dfb0a40c85c32adb85cc7f09071c92fdf03b736d66165.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
119e5bf72d68c4881a5dfb0a40c85c32adb85cc7f09071c92fdf03b736d66165.execmd.exedescription pid process target process PID 752 wrote to memory of 1680 752 119e5bf72d68c4881a5dfb0a40c85c32adb85cc7f09071c92fdf03b736d66165.exe cmd.exe PID 752 wrote to memory of 1680 752 119e5bf72d68c4881a5dfb0a40c85c32adb85cc7f09071c92fdf03b736d66165.exe cmd.exe PID 752 wrote to memory of 1680 752 119e5bf72d68c4881a5dfb0a40c85c32adb85cc7f09071c92fdf03b736d66165.exe cmd.exe PID 1680 wrote to memory of 908 1680 cmd.exe choice.exe PID 1680 wrote to memory of 908 1680 cmd.exe choice.exe PID 1680 wrote to memory of 908 1680 cmd.exe choice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\119e5bf72d68c4881a5dfb0a40c85c32adb85cc7f09071c92fdf03b736d66165.exe"C:\Users\Admin\AppData\Local\Temp\119e5bf72d68c4881a5dfb0a40c85c32adb85cc7f09071c92fdf03b736d66165.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\119e5bf72d68c4881a5dfb0a40c85c32adb85cc7f09071c92fdf03b736d66165.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:908
-
-