Analysis
-
max time kernel
142s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 19:53
Behavioral task
behavioral1
Sample
5517639324b58d5eb535cdf583cd549a56dd0a0cf53cd99995a9afa712410ccf.exe
Resource
win7-20220901-en
3 signatures
150 seconds
General
-
Target
5517639324b58d5eb535cdf583cd549a56dd0a0cf53cd99995a9afa712410ccf.exe
-
Size
275KB
-
MD5
f8b1e2d66e219a5ee5f034ebe238a545
-
SHA1
a7eeb68e51d1a1b1b7e8eb3a65368c26d5d6e832
-
SHA256
5517639324b58d5eb535cdf583cd549a56dd0a0cf53cd99995a9afa712410ccf
-
SHA512
30ec9b52fa402a00044b1e777f41222553c7e759a6ffe0cd1abc0cc81acbfa1e7acb63f683fa8a33a4bd30ce613fdbad3eb8e1b78c94f92b1b25ed641be6ffe5
-
SSDEEP
6144:B/zs53Q2cTCwsjhuLxnRq3NN9+L3zySv95gxbIS:Rs5A2ul0TueSvsBI
Malware Config
Signatures
-
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 5517639324b58d5eb535cdf583cd549a56dd0a0cf53cd99995a9afa712410ccf.exe File created C:\Windows\system32\drivers\etc\hosts.bakfile 5517639324b58d5eb535cdf583cd549a56dd0a0cf53cd99995a9afa712410ccf.exe File opened for modification C:\Windows\system32\drivers\etc\hosts.bakfile 5517639324b58d5eb535cdf583cd549a56dd0a0cf53cd99995a9afa712410ccf.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1048 5517639324b58d5eb535cdf583cd549a56dd0a0cf53cd99995a9afa712410ccf.exe 1048 5517639324b58d5eb535cdf583cd549a56dd0a0cf53cd99995a9afa712410ccf.exe