Analysis
-
max time kernel
45s -
max time network
31s -
platform
windows10-1703_x64 -
resource
win10-20231215-en -
resource tags
arch:x64arch:x86image:win10-20231215-enlocale:en-usos:windows10-1703-x64system -
submitted
23/12/2023, 20:47
Static task
static1
1 signatures
General
-
Target
Setup.exe
-
Size
5.3MB
-
MD5
b97f1e33de763f29fffc2987b87db5f9
-
SHA1
d761d2763a1f6fe5a496e2bb6154ab0c458f0c21
-
SHA256
e55217f73f8dbf197642e214c274e71a5c42916effdc73b8e70252e175c587a1
-
SHA512
36f2e46108a8dd8eaf551122be32f5c5f40df2ea3a1ad0c8e38cf98136f375afd5199717ca042470e1a396b4f84f799ffed644c7b85fa27b8fedc69c8c561465
-
SSDEEP
49152:yoSe2FxL55aKQ35Nqoe7fVO22SCDrbWXD3UcodT2BP60kNwNF5RlSiYecHF61X7z:Exaw4jK2gYvnAg8zyAX++NpO0z
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1276 Setup.exe 1276 Setup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1276
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2500