Analysis
-
max time kernel
46s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
15-09-2022 03:25
Behavioral task
behavioral1
Sample
2a577ff2a830e161471a1685b4e23f8563caed96f1946fb6ceb769d399d99152.exe
Resource
win7-20220901-en
6 signatures
300 seconds
General
-
Target
2a577ff2a830e161471a1685b4e23f8563caed96f1946fb6ceb769d399d99152.exe
-
Size
4.0MB
-
MD5
3fdc547502020edab1c0ee584c394611
-
SHA1
d06e66ce11933d4b4c005100f563dd37c32b2b14
-
SHA256
2a577ff2a830e161471a1685b4e23f8563caed96f1946fb6ceb769d399d99152
-
SHA512
09edd1bdfd659c63639326ac0c12f90108586ae8c1f66ce4161bc6ef64da9374519eb41f6a3dd71f45bfd1cde162bd6c697c0ee8ce5510244c8899ade708f6d2
-
SSDEEP
98304:ip10obfLXReaaSgG5ulp43A0yXCSZC+yiyqeH1CneUKzO:ip1Jf4aaSgGODXCMC+dIUne
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/1816-54-0x00000000003E0000-0x00000000011B9000-memory.dmp family_ytstealer behavioral1/memory/1816-57-0x00000000003E0000-0x00000000011B9000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1816-54-0x00000000003E0000-0x00000000011B9000-memory.dmp upx behavioral1/memory/1816-57-0x00000000003E0000-0x00000000011B9000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1816 2a577ff2a830e161471a1685b4e23f8563caed96f1946fb6ceb769d399d99152.exe 1816 2a577ff2a830e161471a1685b4e23f8563caed96f1946fb6ceb769d399d99152.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1816 wrote to memory of 588 1816 2a577ff2a830e161471a1685b4e23f8563caed96f1946fb6ceb769d399d99152.exe 28 PID 1816 wrote to memory of 588 1816 2a577ff2a830e161471a1685b4e23f8563caed96f1946fb6ceb769d399d99152.exe 28 PID 1816 wrote to memory of 588 1816 2a577ff2a830e161471a1685b4e23f8563caed96f1946fb6ceb769d399d99152.exe 28 PID 588 wrote to memory of 632 588 cmd.exe 30 PID 588 wrote to memory of 632 588 cmd.exe 30 PID 588 wrote to memory of 632 588 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a577ff2a830e161471a1685b4e23f8563caed96f1946fb6ceb769d399d99152.exe"C:\Users\Admin\AppData\Local\Temp\2a577ff2a830e161471a1685b4e23f8563caed96f1946fb6ceb769d399d99152.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\2a577ff2a830e161471a1685b4e23f8563caed96f1946fb6ceb769d399d99152.exe2⤵
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:632
-
-