Analysis
-
max time kernel
175s -
max time network
199s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2022 04:35
Static task
static1
Behavioral task
behavioral1
Sample
f750becb10744038878cbf3f40bfafbf7c8f883d7d8b01aafead85d1fd3aedb7.exe
Resource
win7-20220812-en
windows7-x64
3 signatures
150 seconds
General
-
Target
f750becb10744038878cbf3f40bfafbf7c8f883d7d8b01aafead85d1fd3aedb7.exe
-
Size
973KB
-
MD5
449a24b1d4f84c97347a9111ac272e0b
-
SHA1
e9778f9c975f5339626650cff0cc8952fb44fdb5
-
SHA256
f750becb10744038878cbf3f40bfafbf7c8f883d7d8b01aafead85d1fd3aedb7
-
SHA512
c55db73e98b5d816d75878a404be2bc3fc10112db5ef8d64c7aef6cd245e20e257c028e4163d1d580c7c876376eade5e71915ed35055c15228fe99ee5b46ac3d
-
SSDEEP
24576:K+wU+0GRJBMyaosJdRnPUKGh6qltQpoRGbkZMA0uSrrY7wH5:IR0GRJ5RsBPUKGhtQugkZO0a5
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3100 f750becb10744038878cbf3f40bfafbf7c8f883d7d8b01aafead85d1fd3aedb7.exe 3100 f750becb10744038878cbf3f40bfafbf7c8f883d7d8b01aafead85d1fd3aedb7.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3100 f750becb10744038878cbf3f40bfafbf7c8f883d7d8b01aafead85d1fd3aedb7.exe 3100 f750becb10744038878cbf3f40bfafbf7c8f883d7d8b01aafead85d1fd3aedb7.exe 3100 f750becb10744038878cbf3f40bfafbf7c8f883d7d8b01aafead85d1fd3aedb7.exe 3100 f750becb10744038878cbf3f40bfafbf7c8f883d7d8b01aafead85d1fd3aedb7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f750becb10744038878cbf3f40bfafbf7c8f883d7d8b01aafead85d1fd3aedb7.exe"C:\Users\Admin\AppData\Local\Temp\f750becb10744038878cbf3f40bfafbf7c8f883d7d8b01aafead85d1fd3aedb7.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3100