Analysis
-
max time kernel
41s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
15-09-2022 03:27
Behavioral task
behavioral1
Sample
330505cf36d2bf010feb21e58eb6c15d2d92ffbefd50127bf1ee5c6a3d6c6a78.exe
Resource
win7-20220812-en
6 signatures
300 seconds
General
-
Target
330505cf36d2bf010feb21e58eb6c15d2d92ffbefd50127bf1ee5c6a3d6c6a78.exe
-
Size
4.0MB
-
MD5
684465275cd9ee7aa9236e95520f4b53
-
SHA1
59e456d6b8877b11713b037077beb431be4ad1fc
-
SHA256
330505cf36d2bf010feb21e58eb6c15d2d92ffbefd50127bf1ee5c6a3d6c6a78
-
SHA512
81b2fcacded28f232ebde68aa8898cb6a64722c77683a70dd0de1899de8b819ddb0e9bcc9a3d62c8fe68bd93513bd5508330c31ccdaa6475e99e524cddd741f5
-
SSDEEP
98304:v68hM9IbzLoa0kXe6EysJKKQXK8AjN3DwkeyDc8EZQMJQI:iUM690kXe9KnK8uN3DW
Malware Config
Signatures
-
YTStealer payload 2 IoCs
resource yara_rule behavioral1/memory/1408-54-0x0000000001220000-0x0000000001FE9000-memory.dmp family_ytstealer behavioral1/memory/1408-57-0x0000000001220000-0x0000000001FE9000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1408-54-0x0000000001220000-0x0000000001FE9000-memory.dmp upx behavioral1/memory/1408-57-0x0000000001220000-0x0000000001FE9000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1408 330505cf36d2bf010feb21e58eb6c15d2d92ffbefd50127bf1ee5c6a3d6c6a78.exe 1408 330505cf36d2bf010feb21e58eb6c15d2d92ffbefd50127bf1ee5c6a3d6c6a78.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1408 wrote to memory of 1784 1408 330505cf36d2bf010feb21e58eb6c15d2d92ffbefd50127bf1ee5c6a3d6c6a78.exe 27 PID 1408 wrote to memory of 1784 1408 330505cf36d2bf010feb21e58eb6c15d2d92ffbefd50127bf1ee5c6a3d6c6a78.exe 27 PID 1408 wrote to memory of 1784 1408 330505cf36d2bf010feb21e58eb6c15d2d92ffbefd50127bf1ee5c6a3d6c6a78.exe 27 PID 1784 wrote to memory of 1752 1784 cmd.exe 29 PID 1784 wrote to memory of 1752 1784 cmd.exe 29 PID 1784 wrote to memory of 1752 1784 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\330505cf36d2bf010feb21e58eb6c15d2d92ffbefd50127bf1ee5c6a3d6c6a78.exe"C:\Users\Admin\AppData\Local\Temp\330505cf36d2bf010feb21e58eb6c15d2d92ffbefd50127bf1ee5c6a3d6c6a78.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\330505cf36d2bf010feb21e58eb6c15d2d92ffbefd50127bf1ee5c6a3d6c6a78.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1752
-
-