Analysis
-
max time kernel
143s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-05-2022 01:02
Static task
static1
Behavioral task
behavioral1
Sample
a87854983aeb8c56b69fca63c0fba2b61b81f46de81ed23018e373ec0324583a.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
a87854983aeb8c56b69fca63c0fba2b61b81f46de81ed23018e373ec0324583a.exe
-
Size
2.1MB
-
MD5
a29877ba123e08fac49b57620975d955
-
SHA1
4f8575494648f06eeb09e03858530f347616b507
-
SHA256
a87854983aeb8c56b69fca63c0fba2b61b81f46de81ed23018e373ec0324583a
-
SHA512
07731519e4afc1a05d961752d706079026bd402bb77a8bb3c4b0e74d9ee6cf82f2797bf91ec604a38a1b4f96b01faad0254dee62141eafcda8ed9ef909706654
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
a87854983aeb8c56b69fca63c0fba2b61b81f46de81ed23018e373ec0324583a.exepid process 4640 a87854983aeb8c56b69fca63c0fba2b61b81f46de81ed23018e373ec0324583a.exe 4640 a87854983aeb8c56b69fca63c0fba2b61b81f46de81ed23018e373ec0324583a.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4640-130-0x0000000010000000-0x00000000100E3000-memory.dmpFilesize
908KB