Analysis
-
max time kernel
91s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2022, 05:56
Static task
static1
Behavioral task
behavioral1
Sample
90657be0c4e12ecab59a5f49c4d42c97dd19e04c4c2352b470bbd73c6098d3ee.exe
Resource
win7-20221111-en
3 signatures
150 seconds
General
-
Target
90657be0c4e12ecab59a5f49c4d42c97dd19e04c4c2352b470bbd73c6098d3ee.exe
-
Size
962KB
-
MD5
f035636218ffa2943c4a83ebc1fa3dd9
-
SHA1
7c18f86a3fb82260af9277c7f99b737fbed830a5
-
SHA256
90657be0c4e12ecab59a5f49c4d42c97dd19e04c4c2352b470bbd73c6098d3ee
-
SHA512
20707a96a3f405e3575935af58a66dc95aeddcf6e666f80f1b41c28c223b10838e78eec917b05b5a4832e65a30b9af260d9cb7caaab1b73bcb9828a301ca4260
-
SSDEEP
24576:Ub3Mw0WK2EQLViZzRCIDPhUXtlq7qR8QBIZ5AxkcSdrZV:g3x0WKUoZzRCIDPn7+ZIZ80r
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5032 90657be0c4e12ecab59a5f49c4d42c97dd19e04c4c2352b470bbd73c6098d3ee.exe 5032 90657be0c4e12ecab59a5f49c4d42c97dd19e04c4c2352b470bbd73c6098d3ee.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 5032 90657be0c4e12ecab59a5f49c4d42c97dd19e04c4c2352b470bbd73c6098d3ee.exe 5032 90657be0c4e12ecab59a5f49c4d42c97dd19e04c4c2352b470bbd73c6098d3ee.exe 5032 90657be0c4e12ecab59a5f49c4d42c97dd19e04c4c2352b470bbd73c6098d3ee.exe 5032 90657be0c4e12ecab59a5f49c4d42c97dd19e04c4c2352b470bbd73c6098d3ee.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\90657be0c4e12ecab59a5f49c4d42c97dd19e04c4c2352b470bbd73c6098d3ee.exe"C:\Users\Admin\AppData\Local\Temp\90657be0c4e12ecab59a5f49c4d42c97dd19e04c4c2352b470bbd73c6098d3ee.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5032