Analysis
-
max time kernel
146s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2022 02:11
Static task
static1
Behavioral task
behavioral1
Sample
dc71bc7c88b056bc547d90f47256e2267ba14cecb6e839e280e89e6f2cc88114.exe
Resource
win7-20220812-en
windows7-x64
1 signatures
150 seconds
General
-
Target
dc71bc7c88b056bc547d90f47256e2267ba14cecb6e839e280e89e6f2cc88114.exe
-
Size
578KB
-
MD5
caa5ccce7f05591b538ea3110d9f9148
-
SHA1
b031b0a0bf2094747972003bb2ee00ffabea534e
-
SHA256
dc71bc7c88b056bc547d90f47256e2267ba14cecb6e839e280e89e6f2cc88114
-
SHA512
6353c971f87c6ac80e6ff12b30259d37da36906175a2493f2a940382890440b269e3f790f2b40b1056ae56f5d91d05f0b10c2666ce72dabadcc418e0047a488b
-
SSDEEP
12288:le8o8ghasuPeU5KQUxAAWS0yO+Dqwq1Bi:lvoTEX5cwHD1B
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc71bc7c88b056bc547d90f47256e2267ba14cecb6e839e280e89e6f2cc88114.exe"C:\Users\Admin\AppData\Local\Temp\dc71bc7c88b056bc547d90f47256e2267ba14cecb6e839e280e89e6f2cc88114.exe"1⤵PID:5032
-
C:\Windows\system32\pacjsworker.exeC:\Windows\system32\pacjsworker.exe 92ffc58d-7abc-42d3-a1a5-3447a8cb834a 8473b049-acf5-4333-be26-66ee0b0a69ef1⤵PID:3632
-
C:\Windows\system32\pacjsworker.exeC:\Windows\system32\pacjsworker.exe c5ad8ec7-1eda-4df5-a626-8d932fc67152 8473b049-acf5-4333-be26-66ee0b0a69ef1⤵PID:2664