Analysis
-
max time kernel
25s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 11:45
Static task
static1
Behavioral task
behavioral1
Sample
50f65e310df6326a3f67541d59a0d42a87de39b87c9d4aae31414e0848b9a5d2.exe
Resource
win7-20220812-en
windows7-x64
3 signatures
150 seconds
General
-
Target
50f65e310df6326a3f67541d59a0d42a87de39b87c9d4aae31414e0848b9a5d2.exe
-
Size
935KB
-
MD5
65eaf74c1415e0728eb353f274a4db85
-
SHA1
6d9e284d945313f3c9c8780ffa4e4b2551a0b084
-
SHA256
50f65e310df6326a3f67541d59a0d42a87de39b87c9d4aae31414e0848b9a5d2
-
SHA512
57fd25146133cd24be62b57fc9cab5772847502f531420319b545d887043e2b95f18f0e4810f7ec81c0a33ca1acb92024cdd449b674e810d690536603ce604d7
-
SSDEEP
24576:9hKrgaIj+7bsYATkNU06QIFjzK5LJcpIF5ukriA0//cSOw:MoYATkXxIlzK5LJb5VrM/R
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
50f65e310df6326a3f67541d59a0d42a87de39b87c9d4aae31414e0848b9a5d2.exepid process 1044 50f65e310df6326a3f67541d59a0d42a87de39b87c9d4aae31414e0848b9a5d2.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
50f65e310df6326a3f67541d59a0d42a87de39b87c9d4aae31414e0848b9a5d2.exepid process 1044 50f65e310df6326a3f67541d59a0d42a87de39b87c9d4aae31414e0848b9a5d2.exe 1044 50f65e310df6326a3f67541d59a0d42a87de39b87c9d4aae31414e0848b9a5d2.exe 1044 50f65e310df6326a3f67541d59a0d42a87de39b87c9d4aae31414e0848b9a5d2.exe 1044 50f65e310df6326a3f67541d59a0d42a87de39b87c9d4aae31414e0848b9a5d2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\50f65e310df6326a3f67541d59a0d42a87de39b87c9d4aae31414e0848b9a5d2.exe"C:\Users\Admin\AppData\Local\Temp\50f65e310df6326a3f67541d59a0d42a87de39b87c9d4aae31414e0848b9a5d2.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1044