Analysis

  • max time kernel
    145s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/11/2022, 12:48

General

  • Target

    7c40ff3e89239cd8613f03e0cbf3002654081a2b2e466b8ba74123b8e3259653.exe

  • Size

    973KB

  • MD5

    28290d43659a76beff36b6816d44818f

  • SHA1

    57dbabb2eff78598aaecd6962a7ad857e0855681

  • SHA256

    7c40ff3e89239cd8613f03e0cbf3002654081a2b2e466b8ba74123b8e3259653

  • SHA512

    403d14489da57bc96cbf6f7f8c73d9444db2e67e2c79a1ac7ce02a45477609b2f09ecb65f67732c677d7de3a62845a1aeeba45ef67c69ed2915281b0dc45a9e5

  • SSDEEP

    24576:K+wU+0GRJBMyaosJdRnPUKGh6qltQpoRGbkZMA0uSrrf7wH5:IR0GRJ5RsBPUKGhtQugkZOZa5

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c40ff3e89239cd8613f03e0cbf3002654081a2b2e466b8ba74123b8e3259653.exe
    "C:\Users\Admin\AppData\Local\Temp\7c40ff3e89239cd8613f03e0cbf3002654081a2b2e466b8ba74123b8e3259653.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2760

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads