Analysis

  • max time kernel
    160s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 14:14

General

  • Target

    5a2dd8a089cb8d03f09865e44d3ce28c44d776dc95efd2cca1fe43da7a22e525.exe

  • Size

    937KB

  • MD5

    ac6dfc653b628d4378b62a3641094e11

  • SHA1

    b289ac0ad68cc78ac61a9c5af6cf89edd7950c7c

  • SHA256

    5a2dd8a089cb8d03f09865e44d3ce28c44d776dc95efd2cca1fe43da7a22e525

  • SHA512

    9854fdcc1077c662705eeff245266244f185d193cb340fd0a94dd68a853bce30e37e329df9fc1857af4b157bf8ab1bd2033a2e91312319c76d16b174a07b9327

  • SSDEEP

    24576:Oj4YKC2ab1h/h9s99JLU8xwRhscqUqAASgCcSIej:tpCTbfh9sNLU8xwRXq78gEj

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a2dd8a089cb8d03f09865e44d3ce28c44d776dc95efd2cca1fe43da7a22e525.exe
    "C:\Users\Admin\AppData\Local\Temp\5a2dd8a089cb8d03f09865e44d3ce28c44d776dc95efd2cca1fe43da7a22e525.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:3008

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads