Analysis

  • max time kernel
    151s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 11:45

General

  • Target

    65e455affea4c78ab8f15635f3cb096a8b8813edf930ad02495f921fe4e5b51d.exe

  • Size

    935KB

  • MD5

    e9660c4a805516cfbd528805fc945e87

  • SHA1

    2d14ab0e603ea82a54caf6504382db66b969e584

  • SHA256

    65e455affea4c78ab8f15635f3cb096a8b8813edf930ad02495f921fe4e5b51d

  • SHA512

    8ec8dc069e6fe014ba2b251a82f01992f768ec92fa0e855753e22cc6594fb1994cfe6a5bf6f189ebed1db728b70581d7e691f0ac76c623339f6d438af8625760

  • SSDEEP

    24576:9hKrgaIj+7bsYATkNU06QIFjzK5LJcpIF5ukriA0//cSFw:MoYATkXxIlzK5LJb5VrM/+

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\65e455affea4c78ab8f15635f3cb096a8b8813edf930ad02495f921fe4e5b51d.exe
    "C:\Users\Admin\AppData\Local\Temp\65e455affea4c78ab8f15635f3cb096a8b8813edf930ad02495f921fe4e5b51d.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:5096

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads