Analysis
-
max time kernel
19s -
max time network
72s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28/11/2022, 05:00
Static task
static1
Behavioral task
behavioral1
Sample
ad08f8a9b923eb0efea4c4b9bbd35a0a56fcfdf673f5c7fec1e7ab1a7461a1d8.exe
Resource
win7-20220812-en
3 signatures
150 seconds
General
-
Target
ad08f8a9b923eb0efea4c4b9bbd35a0a56fcfdf673f5c7fec1e7ab1a7461a1d8.exe
-
Size
973KB
-
MD5
c054877f795b7673b2ac713b7d11855c
-
SHA1
2b8a3c1df908b8e7278ff94f0369103926dc8c84
-
SHA256
ad08f8a9b923eb0efea4c4b9bbd35a0a56fcfdf673f5c7fec1e7ab1a7461a1d8
-
SHA512
b3ab5648ae8365ee9f2d8348ed896c0885af0a666401e05947bb0d0d2651b77ae923a2c0c71d4c98c8f2b77b7871f2485d5b6642bb049c176bcecb5b3f0eb69b
-
SSDEEP
24576:K+wU+0GRJBMyaosJdRnPUKGh6qltQpoRGbkZMA0uSrr07wH5:IR0GRJ5RsBPUKGhtQugkZOga5
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 976 ad08f8a9b923eb0efea4c4b9bbd35a0a56fcfdf673f5c7fec1e7ab1a7461a1d8.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 976 ad08f8a9b923eb0efea4c4b9bbd35a0a56fcfdf673f5c7fec1e7ab1a7461a1d8.exe 976 ad08f8a9b923eb0efea4c4b9bbd35a0a56fcfdf673f5c7fec1e7ab1a7461a1d8.exe 976 ad08f8a9b923eb0efea4c4b9bbd35a0a56fcfdf673f5c7fec1e7ab1a7461a1d8.exe 976 ad08f8a9b923eb0efea4c4b9bbd35a0a56fcfdf673f5c7fec1e7ab1a7461a1d8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad08f8a9b923eb0efea4c4b9bbd35a0a56fcfdf673f5c7fec1e7ab1a7461a1d8.exe"C:\Users\Admin\AppData\Local\Temp\ad08f8a9b923eb0efea4c4b9bbd35a0a56fcfdf673f5c7fec1e7ab1a7461a1d8.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:976