Analysis

  • max time kernel
    181s
  • max time network
    205s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 16:44

General

  • Target

    7ef9be62788b27d596de180aff8ca2ce689e47bba9f7ef5a3a73ff82f6694f72.exe

  • Size

    1.3MB

  • MD5

    2d2c40e929e909f20f41625a537fe1f4

  • SHA1

    8c9333eebe722a8eece2bf741e7d3e609dbda091

  • SHA256

    7ef9be62788b27d596de180aff8ca2ce689e47bba9f7ef5a3a73ff82f6694f72

  • SHA512

    d5f49e249edbe88ca5cae1306b8a9c1194144e32c0bdb238046aa5e562b1e8a04d91fec4840f520c11717ee2a870049ae7e6f779de20ad474433c5febe2f4117

  • SSDEEP

    24576:69jCsq8srPKK1BUtfEit79HIaOxabqA4ZTAbFcSB:nN8srPKEUtfEit79HINaN4Z4

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7ef9be62788b27d596de180aff8ca2ce689e47bba9f7ef5a3a73ff82f6694f72.exe
    "C:\Users\Admin\AppData\Local\Temp\7ef9be62788b27d596de180aff8ca2ce689e47bba9f7ef5a3a73ff82f6694f72.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:4488

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads