Analysis

  • max time kernel
    23s
  • max time network
    59s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    28-11-2022 04:58

General

  • Target

    b44a3fdc003a9bfa85f2a52aebf645d6d03c04d37b265ab2d00fefdad8590823.exe

  • Size

    973KB

  • MD5

    e8a0367efedd1010869cbeac6bd4d73e

  • SHA1

    55ab9c31a92fb6f4807b29cff7f03f8a9ad613f3

  • SHA256

    b44a3fdc003a9bfa85f2a52aebf645d6d03c04d37b265ab2d00fefdad8590823

  • SHA512

    dd17c1c78b00e426df901a9e53989fb8c7a4b4305e80a615151da8571cd71e860152d1f8223a69cf872d65eecf4b3cab51dd9cc49fcdc64257ef92a52a273b07

  • SSDEEP

    24576:K+wU+0GRJBMyaosJdRnPUKGh6qltQpoRGbkZMA0uSrrH7wH5:IR0GRJ5RsBPUKGhtQugkZOZa5

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b44a3fdc003a9bfa85f2a52aebf645d6d03c04d37b265ab2d00fefdad8590823.exe
    "C:\Users\Admin\AppData\Local\Temp\b44a3fdc003a9bfa85f2a52aebf645d6d03c04d37b265ab2d00fefdad8590823.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1956

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1956-54-0x0000000074F01000-0x0000000074F03000-memory.dmp

    Filesize

    8KB