Analysis

  • max time kernel
    180s
  • max time network
    192s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/11/2022, 15:48

General

  • Target

    714a3c0a8704c416a45404d0cb5439ea2fcf9ce82d39223cb48c4534f4a3bb77.exe

  • Size

    1.3MB

  • MD5

    d5d5648b7fa9000e1ce3b8edfab69ba6

  • SHA1

    10fe6cd5d648109fe7d1bc94ae122cbd07dc143b

  • SHA256

    714a3c0a8704c416a45404d0cb5439ea2fcf9ce82d39223cb48c4534f4a3bb77

  • SHA512

    b8143f59317c19c3d98c1de05bc0f600c1d653ad7f4dc6cffc53759fb017de629aba45daf2b88d3c868f3f6531ded63e72966f0aacbab668227989b8662dbf67

  • SSDEEP

    24576:0N0GwyBuP3nClQbhuaVab2FzUqh6v5BunN4EcSsnz+FbLdY:8FwyBuPSlqhuaVab2Fzd6fI4qFbLdY

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\714a3c0a8704c416a45404d0cb5439ea2fcf9ce82d39223cb48c4534f4a3bb77.exe
    "C:\Users\Admin\AppData\Local\Temp\714a3c0a8704c416a45404d0cb5439ea2fcf9ce82d39223cb48c4534f4a3bb77.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:3492

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads