Analysis
-
max time kernel
23s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 13:10
Static task
static1
Behavioral task
behavioral1
Sample
a604808b4e60b62c0d025c09d186fb6fba98bac2c0b0050a9cdd122feb04593c.exe
Resource
win7-20220812-en
General
-
Target
a604808b4e60b62c0d025c09d186fb6fba98bac2c0b0050a9cdd122feb04593c.exe
-
Size
1.7MB
-
MD5
d18cc158e1021bc402e785e9ff418a8e
-
SHA1
65500ac8e60d5da439b1194d36ab86de0cd14900
-
SHA256
a604808b4e60b62c0d025c09d186fb6fba98bac2c0b0050a9cdd122feb04593c
-
SHA512
e3a6b0a9e17824683c55e44512df62d696bfeabbdeb95b4cab48f848bb4b9f20520751b514e7e3a21203110bc868b2666fe420191d429b37546fc9292b51474a
-
SSDEEP
49152:xFprkyrqh261Ib/ENEaja4N1jc2sMkSB:xDgMq06KTENEQDN1jcQk
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\icncamkooinmbehmkeilcccmoljfkdhp\138\manifest.json a604808b4e60b62c0d025c09d186fb6fba98bac2c0b0050a9cdd122feb04593c.exe File created C:\Users\Administrator\AppData\Local\Google\Chrome\User Data\Default\Extensions\icncamkooinmbehmkeilcccmoljfkdhp\138\manifest.json a604808b4e60b62c0d025c09d186fb6fba98bac2c0b0050a9cdd122feb04593c.exe File created C:\Users\Guest\AppData\Local\Google\Chrome\User Data\Default\Extensions\icncamkooinmbehmkeilcccmoljfkdhp\138\manifest.json a604808b4e60b62c0d025c09d186fb6fba98bac2c0b0050a9cdd122feb04593c.exe