Analysis

  • max time kernel
    38s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 11:44

General

  • Target

    bc036313656f516d7486790bcdc2ec34ba22c780e2c37ed0a4cc16337fbda598.exe

  • Size

    935KB

  • MD5

    66818cd098e8ee748b0ffc3bdac07d72

  • SHA1

    ca519e0963c5dfa664aed15f5c066a70c22a2821

  • SHA256

    bc036313656f516d7486790bcdc2ec34ba22c780e2c37ed0a4cc16337fbda598

  • SHA512

    2e3f4b53cb0bb56e27547d2088eb74296beeed2a10f167ba08989728b49366b99819bd3597812cbcc449c3be75cb5b96de7d549dcacdea01b3357220ddd8046b

  • SSDEEP

    24576:9hKrgaIj+7bsYATkNU06QIFjzK5LJcpIF5ukriA0//cS+w:MoYATkXxIlzK5LJb5VrM/p

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc036313656f516d7486790bcdc2ec34ba22c780e2c37ed0a4cc16337fbda598.exe
    "C:\Users\Admin\AppData\Local\Temp\bc036313656f516d7486790bcdc2ec34ba22c780e2c37ed0a4cc16337fbda598.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2012

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2012-54-0x0000000075E81000-0x0000000075E83000-memory.dmp

    Filesize

    8KB