Analysis
-
max time kernel
41s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
28-11-2022 05:05
Static task
static1
Behavioral task
behavioral1
Sample
9ed92b9c54fe2e23117c51b68387af8c02d5227b70b18338c7db7897f3732484.exe
Resource
win7-20220812-en
windows7-x64
3 signatures
150 seconds
General
-
Target
9ed92b9c54fe2e23117c51b68387af8c02d5227b70b18338c7db7897f3732484.exe
-
Size
973KB
-
MD5
66325cc78ab9ac640a8fd0f7aa618487
-
SHA1
ef26707eef4704d4da91bb21c105ddf361dba412
-
SHA256
9ed92b9c54fe2e23117c51b68387af8c02d5227b70b18338c7db7897f3732484
-
SHA512
1ee56107b415e7abb8e60d30efaaea5e27b3793c3cf467c3275dc3ea3c12dada3c7a2df60822ede482a05f699e0053a671e7c7856bb5193e1d8904226434d584
-
SSDEEP
24576:K+wU+0GRJBMyaosJdRnPUKGh6qltQpoRGbkZMA0uSrrf7wH5:IR0GRJ5RsBPUKGhtQugkZOha5
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1584 9ed92b9c54fe2e23117c51b68387af8c02d5227b70b18338c7db7897f3732484.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1584 9ed92b9c54fe2e23117c51b68387af8c02d5227b70b18338c7db7897f3732484.exe 1584 9ed92b9c54fe2e23117c51b68387af8c02d5227b70b18338c7db7897f3732484.exe 1584 9ed92b9c54fe2e23117c51b68387af8c02d5227b70b18338c7db7897f3732484.exe 1584 9ed92b9c54fe2e23117c51b68387af8c02d5227b70b18338c7db7897f3732484.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ed92b9c54fe2e23117c51b68387af8c02d5227b70b18338c7db7897f3732484.exe"C:\Users\Admin\AppData\Local\Temp\9ed92b9c54fe2e23117c51b68387af8c02d5227b70b18338c7db7897f3732484.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1584