Analysis

  • max time kernel
    143s
  • max time network
    186s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 15:27

General

  • Target

    f51309a058e64c71287d4451a819dd6fff58964e6eb570ffe38c8e9e68dda183.exe

  • Size

    1.3MB

  • MD5

    c28305cee71578630bcf5de80328c668

  • SHA1

    721de3d02906adfbdabd6159b82dc7ee59d9d798

  • SHA256

    f51309a058e64c71287d4451a819dd6fff58964e6eb570ffe38c8e9e68dda183

  • SHA512

    b2bd3cc56ced58592ca1e170ab2ac0be4fd5a459965ebfb631ded52583be692607be73cc2b83f482e5eec2586b8ef72b73c1149d2297b188e9be5604564cc27b

  • SSDEEP

    24576:vCbV1tebpntzapYXTul7JOaNBbArSv8e0ZtAEZcS8qNT:sEbpnKoTul7JOaNOrve0Z1BNT

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f51309a058e64c71287d4451a819dd6fff58964e6eb570ffe38c8e9e68dda183.exe
    "C:\Users\Admin\AppData\Local\Temp\f51309a058e64c71287d4451a819dd6fff58964e6eb570ffe38c8e9e68dda183.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:5112

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads