Analysis

  • max time kernel
    30s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 12:51

General

  • Target

    e3cfaef78731984a9ef1ab04ce7bb777866131bb1b92a4f0b5ef0d47482c29d4.exe

  • Size

    935KB

  • MD5

    2c1ac7b320974020342a20260302ca51

  • SHA1

    0fbcd2055b6a96a26d8e834bf7960a5be2fee4b9

  • SHA256

    e3cfaef78731984a9ef1ab04ce7bb777866131bb1b92a4f0b5ef0d47482c29d4

  • SHA512

    3b082aaa044838580970f55c3df93d5a5e54100306c37de20034e4bdbed160a7943dc11e7710db49acf720e3639583616d4ab824c80f299995606b49f9c43393

  • SSDEEP

    24576:lhojaX5qTbSnL4kwUlZNKfMwgxwUZA01BAypIcSTgFEEoF:7caX5q+Xw8ZNKfMJwyA0XpP2EoF

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e3cfaef78731984a9ef1ab04ce7bb777866131bb1b92a4f0b5ef0d47482c29d4.exe
    "C:\Users\Admin\AppData\Local\Temp\e3cfaef78731984a9ef1ab04ce7bb777866131bb1b92a4f0b5ef0d47482c29d4.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1728

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1728-54-0x0000000076221000-0x0000000076223000-memory.dmp

    Filesize

    8KB