Analysis

  • max time kernel
    156s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/11/2022, 04:19

General

  • Target

    ef5b62e73c382f690655560cd49e056f4a47bddf61c7cf7489b9470ee9fb90c5.exe

  • Size

    1.3MB

  • MD5

    052c428011657d9b0085aab6467ff400

  • SHA1

    2f257984cc663a5999d74203acb7170f2e165eaf

  • SHA256

    ef5b62e73c382f690655560cd49e056f4a47bddf61c7cf7489b9470ee9fb90c5

  • SHA512

    d056f7be56cd0e0d305c231575418e6b8cd20563ec4eda83c5950bda08abaf9ca5efa7ef6a38d386be494b4e79df76c722022288b02ceebeab7fb9773ffce55f

  • SSDEEP

    24576:L0a1Gp1LZGbq+FA0b7LwA7jfJ5Y2bHgSirTh5GJGa2Kn:zadwLD70A7jfJGkITh5GJGarn

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef5b62e73c382f690655560cd49e056f4a47bddf61c7cf7489b9470ee9fb90c5.exe
    "C:\Users\Admin\AppData\Local\Temp\ef5b62e73c382f690655560cd49e056f4a47bddf61c7cf7489b9470ee9fb90c5.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:5036

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads