Analysis
-
max time kernel
145s -
max time network
159s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
11-05-2022 23:16
Static task
static1
Behavioral task
behavioral1
Sample
94eddddb37b71fa6c5ba941e251f8b133df3768c969bb4984ff9db76c6c991ea.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
94eddddb37b71fa6c5ba941e251f8b133df3768c969bb4984ff9db76c6c991ea.exe
-
Size
349KB
-
MD5
44b70e5c83c493b3ae96fca7f29dac2c
-
SHA1
7823d6cc1748ae69ce19cf422e5837414b1d5838
-
SHA256
94eddddb37b71fa6c5ba941e251f8b133df3768c969bb4984ff9db76c6c991ea
-
SHA512
c1f9d1e269e335aa1d3fd47dc9bbf0b950d82fafb489b46e743c171d93baef7722c840958fc87da6004c264228d47432c41135e5116be5c8617576ed99d5cfa8
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
94eddddb37b71fa6c5ba941e251f8b133df3768c969bb4984ff9db76c6c991ea.exepid process 1296 94eddddb37b71fa6c5ba941e251f8b133df3768c969bb4984ff9db76c6c991ea.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1296-54-0x0000000074F21000-0x0000000074F23000-memory.dmpFilesize
8KB