Analysis

  • max time kernel
    96s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/11/2022, 23:21

General

  • Target

    51bcfdca9b139abe0e67d6bed8ffa32cf7edd1e7c321bd8384cddb2ec877938d.exe

  • Size

    935KB

  • MD5

    1245aaa6ca4bae3776cff62077beaa32

  • SHA1

    06c78205ca19771d8ee445feb93001355ebe58bb

  • SHA256

    51bcfdca9b139abe0e67d6bed8ffa32cf7edd1e7c321bd8384cddb2ec877938d

  • SHA512

    9e02c3a7dc1b16d07377e1ff419f5d36553fb969f70706fac111c543067c5e4def7071c36ee3bc88c6c6090f55b7fc40dc4ca316046eb3540c0d6721a3790410

  • SSDEEP

    24576:bID6QudHAV1pJCDYFgYfgNvWexE9MoAhMjcS3ZscrW:s5udHABJeY6YfgNvPEaTM2ca

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\51bcfdca9b139abe0e67d6bed8ffa32cf7edd1e7c321bd8384cddb2ec877938d.exe
    "C:\Users\Admin\AppData\Local\Temp\51bcfdca9b139abe0e67d6bed8ffa32cf7edd1e7c321bd8384cddb2ec877938d.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2384

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads