Analysis
-
max time kernel
151s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 21:16
Static task
static1
Behavioral task
behavioral1
Sample
8d05fa69845d9d8d4871eec46c5c33dfca84adaeb868a62fae82b99d7d8c5a8d.exe
Resource
win7-20221111-en
3 signatures
150 seconds
General
-
Target
8d05fa69845d9d8d4871eec46c5c33dfca84adaeb868a62fae82b99d7d8c5a8d.exe
-
Size
961KB
-
MD5
7369a54b98eceb8821bde6c2c5d9f7e9
-
SHA1
9837a52d8c196dc3e85028f11a006a3614c98937
-
SHA256
8d05fa69845d9d8d4871eec46c5c33dfca84adaeb868a62fae82b99d7d8c5a8d
-
SHA512
7b150c0d2527d94cabc18d93a29e74764f9d421d0c39f12211c59a0710873f7435355cc5fb599b01d3aa849c48ff1fba212a1a108d27fd1e455f22cdf1667d9e
-
SSDEEP
24576:rkQ1aOCco82PkHsddUplpYE+JglzGWqVgjsaxZiAvS5cS3S:I/co82CsrUplpYEZ1BjsEZy4
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1792 8d05fa69845d9d8d4871eec46c5c33dfca84adaeb868a62fae82b99d7d8c5a8d.exe 1792 8d05fa69845d9d8d4871eec46c5c33dfca84adaeb868a62fae82b99d7d8c5a8d.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1792 8d05fa69845d9d8d4871eec46c5c33dfca84adaeb868a62fae82b99d7d8c5a8d.exe 1792 8d05fa69845d9d8d4871eec46c5c33dfca84adaeb868a62fae82b99d7d8c5a8d.exe 1792 8d05fa69845d9d8d4871eec46c5c33dfca84adaeb868a62fae82b99d7d8c5a8d.exe 1792 8d05fa69845d9d8d4871eec46c5c33dfca84adaeb868a62fae82b99d7d8c5a8d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d05fa69845d9d8d4871eec46c5c33dfca84adaeb868a62fae82b99d7d8c5a8d.exe"C:\Users\Admin\AppData\Local\Temp\8d05fa69845d9d8d4871eec46c5c33dfca84adaeb868a62fae82b99d7d8c5a8d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1792