Analysis
-
max time kernel
42s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 15:36
Static task
static1
Behavioral task
behavioral1
Sample
e8949c1166f9ece8be43f1deebd4082083578a40799584a5f889e257dc1f4891.exe
Resource
win7-20220812-en
windows7-x64
3 signatures
150 seconds
General
-
Target
e8949c1166f9ece8be43f1deebd4082083578a40799584a5f889e257dc1f4891.exe
-
Size
1.3MB
-
MD5
697a3a0cd7b61284725222ff94b7f5fe
-
SHA1
346a06335db865afb1c83446abebbf1d99f7b622
-
SHA256
e8949c1166f9ece8be43f1deebd4082083578a40799584a5f889e257dc1f4891
-
SHA512
835224d7fe8d7834311856f4c84f11ef6a98191a4d7505d2933dc5d4505b25deddb13355a04c3ce3ce0426be1be55e49910828a5110e4bb004857daf632037ce
-
SSDEEP
24576:5ZVRmsPJt+vRECi67v1yFN2F2KhZhLVZSAJAcSkZM:1PJt+OCi67v1yFNFKN5ZR1
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
e8949c1166f9ece8be43f1deebd4082083578a40799584a5f889e257dc1f4891.exepid process 1100 e8949c1166f9ece8be43f1deebd4082083578a40799584a5f889e257dc1f4891.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
e8949c1166f9ece8be43f1deebd4082083578a40799584a5f889e257dc1f4891.exepid process 1100 e8949c1166f9ece8be43f1deebd4082083578a40799584a5f889e257dc1f4891.exe 1100 e8949c1166f9ece8be43f1deebd4082083578a40799584a5f889e257dc1f4891.exe 1100 e8949c1166f9ece8be43f1deebd4082083578a40799584a5f889e257dc1f4891.exe 1100 e8949c1166f9ece8be43f1deebd4082083578a40799584a5f889e257dc1f4891.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8949c1166f9ece8be43f1deebd4082083578a40799584a5f889e257dc1f4891.exe"C:\Users\Admin\AppData\Local\Temp\e8949c1166f9ece8be43f1deebd4082083578a40799584a5f889e257dc1f4891.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1100