Analysis

  • max time kernel
    75s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    28-11-2022 05:14

General

  • Target

    808a3783e1d9ed177a176d0a3d07a244d6f088f8d06117409ab59912017f1d88.exe

  • Size

    973KB

  • MD5

    23b9e552df9086a706e9bfc1aba39108

  • SHA1

    f15e08f0c1b8095ca2ada4fa630b361ad9ada2c8

  • SHA256

    808a3783e1d9ed177a176d0a3d07a244d6f088f8d06117409ab59912017f1d88

  • SHA512

    e4b721ab38df086e8342bd98920bcd93f0f0b1a57cc632d79624e2aa78686ee4a20b76b2e02f9cfbbb9837d793ce6b272517b5ed8a342cbb4e71c0aacc51dbb8

  • SSDEEP

    24576:K+wU+0GRJBMyaosJdRnPUKGh6qltQpoRGbkZMA0uSrrh7wH5:IR0GRJ5RsBPUKGhtQugkZOja5

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\808a3783e1d9ed177a176d0a3d07a244d6f088f8d06117409ab59912017f1d88.exe
    "C:\Users\Admin\AppData\Local\Temp\808a3783e1d9ed177a176d0a3d07a244d6f088f8d06117409ab59912017f1d88.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:900

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/900-54-0x00000000759F1000-0x00000000759F3000-memory.dmp

    Filesize

    8KB