Analysis

  • max time kernel
    186s
  • max time network
    194s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 13:49

General

  • Target

    836cf470606d0eeeb71d2f6c61fd078495066b8019ad1be8173bda3ee2454eb0.exe

  • Size

    937KB

  • MD5

    6431bec0f82aff57ff7f96a5cbe09810

  • SHA1

    44f1de78d176a295dd2daa809cfa24f1ca674daa

  • SHA256

    836cf470606d0eeeb71d2f6c61fd078495066b8019ad1be8173bda3ee2454eb0

  • SHA512

    ee77d29d1e15817fbcd519f60ed16136b69969b637e0ee39bff0551a65e778b9fd33f5c8c10b6f9cf8869406e14f49ebee12516292a651525188289d3dedc9c8

  • SSDEEP

    24576:Oj4YKC2ab1h/h9s99JLU8xwRhscqUqAASgCcSvej:tpCTbfh9sNLU8xwRXq78g5j

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\836cf470606d0eeeb71d2f6c61fd078495066b8019ad1be8173bda3ee2454eb0.exe
    "C:\Users\Admin\AppData\Local\Temp\836cf470606d0eeeb71d2f6c61fd078495066b8019ad1be8173bda3ee2454eb0.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:4812

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads