Analysis

  • max time kernel
    153s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-11-2022 05:29

General

  • Target

    fe56e0ce77d0c06a2b8130c832d188f6922e5f0a7de971e695b361d7b7d34167.exe

  • Size

    1.3MB

  • MD5

    082771600f15687b0b3bf58f6cb7d800

  • SHA1

    f0f5e2935566a741850150a2bc5ba08d245a351f

  • SHA256

    fe56e0ce77d0c06a2b8130c832d188f6922e5f0a7de971e695b361d7b7d34167

  • SHA512

    778e28de1a50ecad532ae54e952656169cc40ae5a90d10f20625f95b36877c743f277e55ae20d6bbe6392dbae052e9f24b805ecb77faf05710b31cba4b738954

  • SSDEEP

    24576:R0a1Gp1LZGbq+FA0t7Lwy7jfJ5Y2bHgSirTh5GJGa2KP:xadwL170y7jfJGkITh5GJGarP

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe56e0ce77d0c06a2b8130c832d188f6922e5f0a7de971e695b361d7b7d34167.exe
    "C:\Users\Admin\AppData\Local\Temp\fe56e0ce77d0c06a2b8130c832d188f6922e5f0a7de971e695b361d7b7d34167.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:3444

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads