Analysis
-
max time kernel
27s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04-10-2022 15:25
Behavioral task
behavioral1
Sample
malware_smoke_95845919.exe
Resource
win7-20220812-en
windows7-x64
7 signatures
150 seconds
General
-
Target
malware_smoke_95845919.exe
-
Size
4.0MB
-
MD5
f2b90caf89abf936fa91a9b007330174
-
SHA1
f6d40b9d09088cbc360afc0e0402d6dca5a8dac2
-
SHA256
c1eae8655ba2f8afc1fdba12f836ad4ba4d26057109b8f70519aba2b88c9b92b
-
SHA512
87bbf70f746b64191cb5075157a9de13852626d1cf49f85695da2ebc53d7712e4f6039f0aedda0842294bd670e14b43800b97e0c0acb9f3711a055e3feb6f5b0
-
SSDEEP
98304:r0w4bFKyOF2oGgYUIjn+xU9jzv/4hbznwSIFnRL:rp4RKElgY7n+kzva+R
Malware Config
Signatures
-
YTStealer payload 1 IoCs
resource yara_rule behavioral1/memory/1592-56-0x0000000000240000-0x0000000001008000-memory.dmp family_ytstealer -
resource yara_rule behavioral1/memory/1592-54-0x0000000000240000-0x0000000001008000-memory.dmp upx behavioral1/memory/1592-56-0x0000000000240000-0x0000000001008000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 656 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1592 malware_smoke_95845919.exe 1592 malware_smoke_95845919.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1592 wrote to memory of 656 1592 malware_smoke_95845919.exe 28 PID 1592 wrote to memory of 656 1592 malware_smoke_95845919.exe 28 PID 1592 wrote to memory of 656 1592 malware_smoke_95845919.exe 28 PID 656 wrote to memory of 1208 656 cmd.exe 30 PID 656 wrote to memory of 1208 656 cmd.exe 30 PID 656 wrote to memory of 1208 656 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\malware_smoke_95845919.exe"C:\Users\Admin\AppData\Local\Temp\malware_smoke_95845919.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /C choice /C Y /N /D Y /T 0 &Del C:\Users\Admin\AppData\Local\Temp\malware_smoke_95845919.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 03⤵PID:1208
-
-