Analysis
-
max time kernel
40s -
max time network
59s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 15:50
Static task
static1
Behavioral task
behavioral1
Sample
d2e64945d996f04309b62e7b78218ca96d6137fc409e681949bb11860619fee5.exe
Resource
win7-20221111-en
windows7-x64
3 signatures
150 seconds
General
-
Target
d2e64945d996f04309b62e7b78218ca96d6137fc409e681949bb11860619fee5.exe
-
Size
1.3MB
-
MD5
3b54f6522c57d19faa195e992c538ae5
-
SHA1
4b61c40c8a6500acfabdd5a8838786fdb9ca1b5f
-
SHA256
d2e64945d996f04309b62e7b78218ca96d6137fc409e681949bb11860619fee5
-
SHA512
35b94e03a8471c4b8bb8bb1d98af4585420978f5501ff4767e7fa1df96f9776325a6bf7f7cde78528ec78277d54475499a73a02a986835cdd6fb10bb0401927b
-
SSDEEP
24576:vCbV1tebpntzapYXTul7JOaNBbArSv8e0ZtAEZcS/qNT:sEbpnKoTul7JOaNOrve0Z1ENT
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
d2e64945d996f04309b62e7b78218ca96d6137fc409e681949bb11860619fee5.exepid process 952 d2e64945d996f04309b62e7b78218ca96d6137fc409e681949bb11860619fee5.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
d2e64945d996f04309b62e7b78218ca96d6137fc409e681949bb11860619fee5.exepid process 952 d2e64945d996f04309b62e7b78218ca96d6137fc409e681949bb11860619fee5.exe 952 d2e64945d996f04309b62e7b78218ca96d6137fc409e681949bb11860619fee5.exe 952 d2e64945d996f04309b62e7b78218ca96d6137fc409e681949bb11860619fee5.exe 952 d2e64945d996f04309b62e7b78218ca96d6137fc409e681949bb11860619fee5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2e64945d996f04309b62e7b78218ca96d6137fc409e681949bb11860619fee5.exe"C:\Users\Admin\AppData\Local\Temp\d2e64945d996f04309b62e7b78218ca96d6137fc409e681949bb11860619fee5.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/952-54-0x0000000075F81000-0x0000000075F83000-memory.dmpFilesize
8KB