Analysis
-
max time kernel
243s -
max time network
279s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 15:41
Static task
static1
Behavioral task
behavioral1
Sample
dff75ed030b94e51fbd4cb6a5320a20edba0706824767bae71e8b9484fee1940.exe
Resource
win7-20221111-en
windows7-x64
3 signatures
150 seconds
General
-
Target
dff75ed030b94e51fbd4cb6a5320a20edba0706824767bae71e8b9484fee1940.exe
-
Size
1.3MB
-
MD5
5eff7a17f9adcc0d6e59c200dd368c77
-
SHA1
b4a7819bc1a68c1bd282ee2de053f1fe65909ab8
-
SHA256
dff75ed030b94e51fbd4cb6a5320a20edba0706824767bae71e8b9484fee1940
-
SHA512
df4f42e25c5586bdb70c92b1503a1bae95688796da552946520c77527ada0c7c363bb43dce074738e5ee826c75d1ab0640035592621a916291699f364bbfdf2f
-
SSDEEP
24576:vCbV1tebpntzapYXTul7JOaNBbArSv8e0ZtAEZcSRqNT:sEbpnKoTul7JOaNOrve0Z1uNT
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
dff75ed030b94e51fbd4cb6a5320a20edba0706824767bae71e8b9484fee1940.exepid process 448 dff75ed030b94e51fbd4cb6a5320a20edba0706824767bae71e8b9484fee1940.exe 448 dff75ed030b94e51fbd4cb6a5320a20edba0706824767bae71e8b9484fee1940.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
dff75ed030b94e51fbd4cb6a5320a20edba0706824767bae71e8b9484fee1940.exepid process 448 dff75ed030b94e51fbd4cb6a5320a20edba0706824767bae71e8b9484fee1940.exe 448 dff75ed030b94e51fbd4cb6a5320a20edba0706824767bae71e8b9484fee1940.exe 448 dff75ed030b94e51fbd4cb6a5320a20edba0706824767bae71e8b9484fee1940.exe 448 dff75ed030b94e51fbd4cb6a5320a20edba0706824767bae71e8b9484fee1940.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dff75ed030b94e51fbd4cb6a5320a20edba0706824767bae71e8b9484fee1940.exe"C:\Users\Admin\AppData\Local\Temp\dff75ed030b94e51fbd4cb6a5320a20edba0706824767bae71e8b9484fee1940.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:448