Analysis

  • max time kernel
    40s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 13:49

General

  • Target

    836cf470606d0eeeb71d2f6c61fd078495066b8019ad1be8173bda3ee2454eb0.exe

  • Size

    937KB

  • MD5

    6431bec0f82aff57ff7f96a5cbe09810

  • SHA1

    44f1de78d176a295dd2daa809cfa24f1ca674daa

  • SHA256

    836cf470606d0eeeb71d2f6c61fd078495066b8019ad1be8173bda3ee2454eb0

  • SHA512

    ee77d29d1e15817fbcd519f60ed16136b69969b637e0ee39bff0551a65e778b9fd33f5c8c10b6f9cf8869406e14f49ebee12516292a651525188289d3dedc9c8

  • SSDEEP

    24576:Oj4YKC2ab1h/h9s99JLU8xwRhscqUqAASgCcSvej:tpCTbfh9sNLU8xwRXq78g5j

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\836cf470606d0eeeb71d2f6c61fd078495066b8019ad1be8173bda3ee2454eb0.exe
    "C:\Users\Admin\AppData\Local\Temp\836cf470606d0eeeb71d2f6c61fd078495066b8019ad1be8173bda3ee2454eb0.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1904

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1904-54-0x00000000762D1000-0x00000000762D3000-memory.dmp
    Filesize

    8KB