Analysis
-
max time kernel
38s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04-10-2022 15:07
Behavioral task
behavioral1
Sample
malware_smoke_1674270581.exe
Resource
win7-20220812-en
windows7-x64
7 signatures
150 seconds
General
-
Target
malware_smoke_1674270581.exe
-
Size
4.0MB
-
MD5
063c6d9a6b645ef5d4e756a64e742afc
-
SHA1
72857a2a3fe6948b5fcb6a8d5555b1fc56b6868d
-
SHA256
8101c71c2c31df8da09ed7dd55da9bbd949b028f8f54f0e1cbffab82b192ed87
-
SHA512
54166ad3375dc246519d56f3710f85b792e3bd13daeee619c641f487b0a11691433d0c9900ba82f6c7d29b2c92e73cf82707b3099753dda6583b39db8d7f8c0b
-
SSDEEP
98304:v/M+dZZSK8hdw8wqxO0dGZeZOLQLtPeEdtcGbr/fBBz:JZSK8hd7NO0cZOqabhr/Lz
Malware Config
Signatures
-
YTStealer payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/832-54-0x00000000002A0000-0x0000000001069000-memory.dmp family_ytstealer behavioral1/memory/832-57-0x00000000002A0000-0x0000000001069000-memory.dmp family_ytstealer -
Processes:
resource yara_rule behavioral1/memory/832-54-0x00000000002A0000-0x0000000001069000-memory.dmp upx behavioral1/memory/832-57-0x00000000002A0000-0x0000000001069000-memory.dmp upx -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 1368 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
malware_smoke_1674270581.exepid Process 832 malware_smoke_1674270581.exe 832 malware_smoke_1674270581.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
malware_smoke_1674270581.execmd.exedescription pid Process procid_target PID 832 wrote to memory of 1368 832 malware_smoke_1674270581.exe 28 PID 832 wrote to memory of 1368 832 malware_smoke_1674270581.exe 28 PID 832 wrote to memory of 1368 832 malware_smoke_1674270581.exe 28 PID 1368 wrote to memory of 1712 1368 cmd.exe 30 PID 1368 wrote to memory of 1712 1368 cmd.exe 30 PID 1368 wrote to memory of 1712 1368 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\malware_smoke_1674270581.exe"C:\Users\Admin\AppData\Local\Temp\malware_smoke_1674270581.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\malware_smoke_1674270581.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1712
-
-