Analysis

  • max time kernel
    154s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-11-2022 11:16

General

  • Target

    1386ab279e626c40bb892c1b619abb225db8eb10d00fcc26ca729dc9bf8d1485.exe

  • Size

    2.0MB

  • MD5

    89f2e59d53730e146f32f26853f95c75

  • SHA1

    f1797522f400e7293830837a8174ebb0684a3aad

  • SHA256

    1386ab279e626c40bb892c1b619abb225db8eb10d00fcc26ca729dc9bf8d1485

  • SHA512

    270f0842d2f87f905a18b4008418180c3cc5b29bc71c713ae9369f8a03040f6fda169b5a16f41d62b7f8125806d32c644f5d02c0fb4b9deaf375d1991fdc9e50

  • SSDEEP

    24576:XIp1cm18bIjHrOjKKnVVB9ZBN8X8QGoFCVJ/VNu51+v3KyPzcMcLY5cSIik2:+74KY7ZBN89MJ/VNu5SKyPzcMcLYql2

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1386ab279e626c40bb892c1b619abb225db8eb10d00fcc26ca729dc9bf8d1485.exe
    "C:\Users\Admin\AppData\Local\Temp\1386ab279e626c40bb892c1b619abb225db8eb10d00fcc26ca729dc9bf8d1485.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:820

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads