Analysis
-
max time kernel
40s -
max time network
95s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 16:52
Static task
static1
Behavioral task
behavioral1
Sample
72aee9aeaac92e84c3622f6387844ab02d3fa554c097d02ccda140125d1f8410.exe
Resource
win7-20221111-en
windows7-x64
3 signatures
150 seconds
General
-
Target
72aee9aeaac92e84c3622f6387844ab02d3fa554c097d02ccda140125d1f8410.exe
-
Size
1.3MB
-
MD5
1272ed7b8bfb258849f6abc71e781fec
-
SHA1
90f79d016a079b5916a7ccdaae580f7467e38e89
-
SHA256
72aee9aeaac92e84c3622f6387844ab02d3fa554c097d02ccda140125d1f8410
-
SHA512
869c9b9f8ceb7c7d307d9de28f03e0163005b4e3d5cd607017f0e518e5c2fd23c6b6c8fe3e50c0d1e05b42880a81189e1955268a3e2e51312eb78bbb7c1d6c0a
-
SSDEEP
24576:5ZVRmsPJt+vRECi67v1yFN2F2KhZhLVZSAJAcSAZM:1PJt+OCi67v1yFNFKN5ZRZ
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
72aee9aeaac92e84c3622f6387844ab02d3fa554c097d02ccda140125d1f8410.exepid process 1188 72aee9aeaac92e84c3622f6387844ab02d3fa554c097d02ccda140125d1f8410.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
72aee9aeaac92e84c3622f6387844ab02d3fa554c097d02ccda140125d1f8410.exepid process 1188 72aee9aeaac92e84c3622f6387844ab02d3fa554c097d02ccda140125d1f8410.exe 1188 72aee9aeaac92e84c3622f6387844ab02d3fa554c097d02ccda140125d1f8410.exe 1188 72aee9aeaac92e84c3622f6387844ab02d3fa554c097d02ccda140125d1f8410.exe 1188 72aee9aeaac92e84c3622f6387844ab02d3fa554c097d02ccda140125d1f8410.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\72aee9aeaac92e84c3622f6387844ab02d3fa554c097d02ccda140125d1f8410.exe"C:\Users\Admin\AppData\Local\Temp\72aee9aeaac92e84c3622f6387844ab02d3fa554c097d02ccda140125d1f8410.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1188