Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
15-09-2022 03:25
Behavioral task
behavioral1
Sample
1fd0c0264a04b86fe176df685b3e20d0caed5553bf01341cdeddf78e12beb212.exe
Resource
win7-20220812-en
6 signatures
300 seconds
General
-
Target
1fd0c0264a04b86fe176df685b3e20d0caed5553bf01341cdeddf78e12beb212.exe
-
Size
4.0MB
-
MD5
6450ec52b7be89e6cd6c00f40da86d13
-
SHA1
68ef838e84576868ba5a32606e19e3b02c7e9842
-
SHA256
1fd0c0264a04b86fe176df685b3e20d0caed5553bf01341cdeddf78e12beb212
-
SHA512
ade9670a146970ed6d9455c778baf8c34329da6420192df8f484f4c9ccb9cad8aedef2daf80040799fed4c37155d0b7bc2b2fbfa0f1b54c3f756cba7782aa6ef
-
SSDEEP
98304:MJG5Di+xypFMcj77V9gSF09HdsOn5J8wtK8iij/X:MJkXxwFMGfrC9HE/SX
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/1504-54-0x0000000000290000-0x0000000001059000-memory.dmp family_ytstealer behavioral1/memory/1504-57-0x0000000000290000-0x0000000001059000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1504-54-0x0000000000290000-0x0000000001059000-memory.dmp upx behavioral1/memory/1504-57-0x0000000000290000-0x0000000001059000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1504 1fd0c0264a04b86fe176df685b3e20d0caed5553bf01341cdeddf78e12beb212.exe 1504 1fd0c0264a04b86fe176df685b3e20d0caed5553bf01341cdeddf78e12beb212.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1504 wrote to memory of 876 1504 1fd0c0264a04b86fe176df685b3e20d0caed5553bf01341cdeddf78e12beb212.exe 28 PID 1504 wrote to memory of 876 1504 1fd0c0264a04b86fe176df685b3e20d0caed5553bf01341cdeddf78e12beb212.exe 28 PID 1504 wrote to memory of 876 1504 1fd0c0264a04b86fe176df685b3e20d0caed5553bf01341cdeddf78e12beb212.exe 28 PID 876 wrote to memory of 636 876 cmd.exe 30 PID 876 wrote to memory of 636 876 cmd.exe 30 PID 876 wrote to memory of 636 876 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1fd0c0264a04b86fe176df685b3e20d0caed5553bf01341cdeddf78e12beb212.exe"C:\Users\Admin\AppData\Local\Temp\1fd0c0264a04b86fe176df685b3e20d0caed5553bf01341cdeddf78e12beb212.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\1fd0c0264a04b86fe176df685b3e20d0caed5553bf01341cdeddf78e12beb212.exe2⤵
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:636
-
-