Analysis
-
max time kernel
68s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 11:40
Static task
static1
Behavioral task
behavioral1
Sample
22fa6df334cc468b6b4ac41d311fefe041328c2326cb720619a547e464576e76.exe
Resource
win7-20221111-en
windows7-x64
3 signatures
150 seconds
General
-
Target
22fa6df334cc468b6b4ac41d311fefe041328c2326cb720619a547e464576e76.exe
-
Size
937KB
-
MD5
01d6e467368ad1f57b96d06ffbf60e99
-
SHA1
0b848f7b71025a527bc3b9e0e2eb7f1583497ebd
-
SHA256
22fa6df334cc468b6b4ac41d311fefe041328c2326cb720619a547e464576e76
-
SHA512
f68cf8133314256a5575ad9777d0dc7c54a5d406d549e220e72a703f036bbdd5b235ec08f4ab59bba7a944a35a37aca9c5c83005c0c4302410aaec0a076e6e5f
-
SSDEEP
24576:eLii0FS812mMs549d0ij+BgFoFoGQI9mWuYAHsbYcSmK:e30E812Dh9d0tBgFoFoI0Wesb
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
22fa6df334cc468b6b4ac41d311fefe041328c2326cb720619a547e464576e76.exepid process 2028 22fa6df334cc468b6b4ac41d311fefe041328c2326cb720619a547e464576e76.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
22fa6df334cc468b6b4ac41d311fefe041328c2326cb720619a547e464576e76.exepid process 2028 22fa6df334cc468b6b4ac41d311fefe041328c2326cb720619a547e464576e76.exe 2028 22fa6df334cc468b6b4ac41d311fefe041328c2326cb720619a547e464576e76.exe 2028 22fa6df334cc468b6b4ac41d311fefe041328c2326cb720619a547e464576e76.exe 2028 22fa6df334cc468b6b4ac41d311fefe041328c2326cb720619a547e464576e76.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\22fa6df334cc468b6b4ac41d311fefe041328c2326cb720619a547e464576e76.exe"C:\Users\Admin\AppData\Local\Temp\22fa6df334cc468b6b4ac41d311fefe041328c2326cb720619a547e464576e76.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2028