Analysis

  • max time kernel
    135s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/11/2022, 12:44

General

  • Target

    d8c7ef6657ff89ab4297845aa619d75f374f377609eba81729bcf09956918463.exe

  • Size

    973KB

  • MD5

    82003d2a948f5374a1d5672f39b741a7

  • SHA1

    958e2fe44e82b0ae820726ef6681b65ad8002943

  • SHA256

    d8c7ef6657ff89ab4297845aa619d75f374f377609eba81729bcf09956918463

  • SHA512

    49dc96dd2de92cd7c85f3d008abc1e06c0f98681b439f212433dd4bf1356b53bfe9c9e4c38e9a87e2aa665f583069711482721b077f2d1ab3bc2b0fbd954fe2b

  • SSDEEP

    24576:K+wU+0GRJBMyaosJdRnPUKGh6qltQpoRGbkZMA0uSrr97wH5:IR0GRJ5RsBPUKGhtQugkZOna5

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d8c7ef6657ff89ab4297845aa619d75f374f377609eba81729bcf09956918463.exe
    "C:\Users\Admin\AppData\Local\Temp\d8c7ef6657ff89ab4297845aa619d75f374f377609eba81729bcf09956918463.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:916

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads