Analysis
-
max time kernel
61s -
max time network
89s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 11:45
Static task
static1
Behavioral task
behavioral1
Sample
1f5938f0b34957050379fa354bb2fddb495637b2d838d8d33aad0729965fba67.exe
Resource
win7-20221111-en
windows7-x64
3 signatures
150 seconds
General
-
Target
1f5938f0b34957050379fa354bb2fddb495637b2d838d8d33aad0729965fba67.exe
-
Size
1.3MB
-
MD5
b96d0f4778957148db71f56ae4c8f5b6
-
SHA1
fadc50da9b49fa9931379e2d8c5829e732711e87
-
SHA256
1f5938f0b34957050379fa354bb2fddb495637b2d838d8d33aad0729965fba67
-
SHA512
8649e7d7ad947b725b6aa725c84b3df38aaa8a308228f1a2c14ef231e631c081cc9604f631d3a7b170ce230470d8f9512370d22516bc748e46dd4f9ac79b38c0
-
SSDEEP
24576:F9uXgidIcYpUiy3wr0n2dqsvV3QhVjlIg/vkJZF9A9Z+AdCMcS/XGZOHR:6KcKURS0nCqsvV3QhIS0U9ZJCpZOHR
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
1f5938f0b34957050379fa354bb2fddb495637b2d838d8d33aad0729965fba67.exepid process 1292 1f5938f0b34957050379fa354bb2fddb495637b2d838d8d33aad0729965fba67.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
1f5938f0b34957050379fa354bb2fddb495637b2d838d8d33aad0729965fba67.exepid process 1292 1f5938f0b34957050379fa354bb2fddb495637b2d838d8d33aad0729965fba67.exe 1292 1f5938f0b34957050379fa354bb2fddb495637b2d838d8d33aad0729965fba67.exe 1292 1f5938f0b34957050379fa354bb2fddb495637b2d838d8d33aad0729965fba67.exe 1292 1f5938f0b34957050379fa354bb2fddb495637b2d838d8d33aad0729965fba67.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f5938f0b34957050379fa354bb2fddb495637b2d838d8d33aad0729965fba67.exe"C:\Users\Admin\AppData\Local\Temp\1f5938f0b34957050379fa354bb2fddb495637b2d838d8d33aad0729965fba67.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1292