Analysis
-
max time kernel
44s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
15-09-2022 03:24
Behavioral task
behavioral1
Sample
1ed83cdde85305c31792de47f0b027895d9abf19382e571306b1ff6e9dc91ed6.exe
Resource
win7-20220901-en
windows7-x64
6 signatures
300 seconds
General
-
Target
1ed83cdde85305c31792de47f0b027895d9abf19382e571306b1ff6e9dc91ed6.exe
-
Size
4.0MB
-
MD5
5dd1803af5860a9a20d99b749a00462e
-
SHA1
b08316ede49f65f91ecf25661e80131e82a18aa4
-
SHA256
1ed83cdde85305c31792de47f0b027895d9abf19382e571306b1ff6e9dc91ed6
-
SHA512
ed80920761d99d53372cb4f99f986d9d6f8f77112cf51a52e65a47ff04cbde3a98128081e825ade025c21ae6b129dacd53e477acd908a378537a313c28377b73
-
SSDEEP
98304:WMR43HBgExAWAyEulBFEnIuP8AxAXS6wnw5h5p2V1G8e:m3hgExNJBmn58iA9wnoh5p2V1Je
Malware Config
Signatures
-
YTStealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1064-54-0x0000000000DB0000-0x0000000001B78000-memory.dmp family_ytstealer behavioral1/memory/1064-57-0x0000000000DB0000-0x0000000001B78000-memory.dmp family_ytstealer -
Processes:
resource yara_rule behavioral1/memory/1064-54-0x0000000000DB0000-0x0000000001B78000-memory.dmp upx behavioral1/memory/1064-57-0x0000000000DB0000-0x0000000001B78000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
1ed83cdde85305c31792de47f0b027895d9abf19382e571306b1ff6e9dc91ed6.exepid Process 1064 1ed83cdde85305c31792de47f0b027895d9abf19382e571306b1ff6e9dc91ed6.exe 1064 1ed83cdde85305c31792de47f0b027895d9abf19382e571306b1ff6e9dc91ed6.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
1ed83cdde85305c31792de47f0b027895d9abf19382e571306b1ff6e9dc91ed6.execmd.exedescription pid Process procid_target PID 1064 wrote to memory of 1488 1064 1ed83cdde85305c31792de47f0b027895d9abf19382e571306b1ff6e9dc91ed6.exe 28 PID 1064 wrote to memory of 1488 1064 1ed83cdde85305c31792de47f0b027895d9abf19382e571306b1ff6e9dc91ed6.exe 28 PID 1064 wrote to memory of 1488 1064 1ed83cdde85305c31792de47f0b027895d9abf19382e571306b1ff6e9dc91ed6.exe 28 PID 1488 wrote to memory of 1820 1488 cmd.exe 30 PID 1488 wrote to memory of 1820 1488 cmd.exe 30 PID 1488 wrote to memory of 1820 1488 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ed83cdde85305c31792de47f0b027895d9abf19382e571306b1ff6e9dc91ed6.exe"C:\Users\Admin\AppData\Local\Temp\1ed83cdde85305c31792de47f0b027895d9abf19382e571306b1ff6e9dc91ed6.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\1ed83cdde85305c31792de47f0b027895d9abf19382e571306b1ff6e9dc91ed6.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1820
-
-