Analysis
-
max time kernel
347s -
max time network
375s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 11:44
Static task
static1
Behavioral task
behavioral1
Sample
aa1dae0e2e5a250bef26b6496661af40a33c784ce9689de0229439a8c1f74354.exe
Resource
win7-20221111-en
windows7-x64
3 signatures
150 seconds
General
-
Target
aa1dae0e2e5a250bef26b6496661af40a33c784ce9689de0229439a8c1f74354.exe
-
Size
935KB
-
MD5
b7669946e1d6ba28cfce4fd165d2198e
-
SHA1
0e5a827a9d17362037fa4ffc239a1fced77f281b
-
SHA256
aa1dae0e2e5a250bef26b6496661af40a33c784ce9689de0229439a8c1f74354
-
SHA512
96f31eb0bb56d1fa24881884dd4bd4eb22995851c9b6f942a5f24ccfe1b5419adaec4eb0d27ec5bdc4f69df86c83ed89d05d25ffc7e6a6f02ca9a692f846b01b
-
SSDEEP
24576:9hKrgaIj+7bsYATkNU06QIFjzK5LJcpIF5ukriA0//cSHw:MoYATkXxIlzK5LJb5VrM/k
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
aa1dae0e2e5a250bef26b6496661af40a33c784ce9689de0229439a8c1f74354.exepid process 2032 aa1dae0e2e5a250bef26b6496661af40a33c784ce9689de0229439a8c1f74354.exe 2032 aa1dae0e2e5a250bef26b6496661af40a33c784ce9689de0229439a8c1f74354.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
aa1dae0e2e5a250bef26b6496661af40a33c784ce9689de0229439a8c1f74354.exepid process 2032 aa1dae0e2e5a250bef26b6496661af40a33c784ce9689de0229439a8c1f74354.exe 2032 aa1dae0e2e5a250bef26b6496661af40a33c784ce9689de0229439a8c1f74354.exe 2032 aa1dae0e2e5a250bef26b6496661af40a33c784ce9689de0229439a8c1f74354.exe 2032 aa1dae0e2e5a250bef26b6496661af40a33c784ce9689de0229439a8c1f74354.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa1dae0e2e5a250bef26b6496661af40a33c784ce9689de0229439a8c1f74354.exe"C:\Users\Admin\AppData\Local\Temp\aa1dae0e2e5a250bef26b6496661af40a33c784ce9689de0229439a8c1f74354.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2032