Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
15-09-2022 03:26
Behavioral task
behavioral1
Sample
30b27481f8000aa358881a5d0a60f5eee60ece9ef73765db686e8f3e6a37367e.exe
Resource
win7-20220812-en
6 signatures
300 seconds
General
-
Target
30b27481f8000aa358881a5d0a60f5eee60ece9ef73765db686e8f3e6a37367e.exe
-
Size
4.0MB
-
MD5
9e6c8bc80a0453eb61a1525a5d5256c7
-
SHA1
9e462edc0a9b07d5096fc58a245e4c5430e9212d
-
SHA256
30b27481f8000aa358881a5d0a60f5eee60ece9ef73765db686e8f3e6a37367e
-
SHA512
0094607be9c15aeb5ce325a09825266cc0a542d44d430a8be66e628bcc6a3e19bc4edcb61ce53f14a946015da633778e96c17925b281d3b8edf6aa7cc300e86d
-
SSDEEP
98304:SxflX0KdTxd4THKt2TCXqY/d4iSBYhxH/P15uGUIxMX:qNN4THAIC6Y/iBYnnu7I2
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/1100-54-0x0000000000B30000-0x0000000001908000-memory.dmp family_ytstealer behavioral1/memory/1100-57-0x0000000000B30000-0x0000000001908000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1100-54-0x0000000000B30000-0x0000000001908000-memory.dmp upx behavioral1/memory/1100-57-0x0000000000B30000-0x0000000001908000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1100 30b27481f8000aa358881a5d0a60f5eee60ece9ef73765db686e8f3e6a37367e.exe 1100 30b27481f8000aa358881a5d0a60f5eee60ece9ef73765db686e8f3e6a37367e.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1100 wrote to memory of 1756 1100 30b27481f8000aa358881a5d0a60f5eee60ece9ef73765db686e8f3e6a37367e.exe 28 PID 1100 wrote to memory of 1756 1100 30b27481f8000aa358881a5d0a60f5eee60ece9ef73765db686e8f3e6a37367e.exe 28 PID 1100 wrote to memory of 1756 1100 30b27481f8000aa358881a5d0a60f5eee60ece9ef73765db686e8f3e6a37367e.exe 28 PID 1756 wrote to memory of 1708 1756 cmd.exe 30 PID 1756 wrote to memory of 1708 1756 cmd.exe 30 PID 1756 wrote to memory of 1708 1756 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\30b27481f8000aa358881a5d0a60f5eee60ece9ef73765db686e8f3e6a37367e.exe"C:\Users\Admin\AppData\Local\Temp\30b27481f8000aa358881a5d0a60f5eee60ece9ef73765db686e8f3e6a37367e.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\30b27481f8000aa358881a5d0a60f5eee60ece9ef73765db686e8f3e6a37367e.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1708
-
-