Analysis

  • max time kernel
    27s
  • max time network
    51s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 17:06

General

  • Target

    5d6d6705d7c94d7ad3f594769ec1a85fdae93431c182fabdf99439b05ab8c516.exe

  • Size

    1.3MB

  • MD5

    daa34e5d2c2717dcf6bb6a0afb56901f

  • SHA1

    be68170614baa9f889d37cbb7ad708ed619e1ca3

  • SHA256

    5d6d6705d7c94d7ad3f594769ec1a85fdae93431c182fabdf99439b05ab8c516

  • SHA512

    e6e6ab25d998047e9c2104a37df0c7c6f30afcc50fd4acbd6299b7253b77ffadf5082b0a2f123371b6f8169320b8d65f3ce50df713bd7f314240d809d98052e4

  • SSDEEP

    24576:nBT7a45fdhGL836ISF8zyi5lhZL6HbOOBB2U5gTpZSAaucSsAMb:VPOL83w8Oi5lhZL6iOH58ZC2M

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5d6d6705d7c94d7ad3f594769ec1a85fdae93431c182fabdf99439b05ab8c516.exe
    "C:\Users\Admin\AppData\Local\Temp\5d6d6705d7c94d7ad3f594769ec1a85fdae93431c182fabdf99439b05ab8c516.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1244

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1244-54-0x0000000075291000-0x0000000075293000-memory.dmp

    Filesize

    8KB