Analysis
-
max time kernel
6s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 06:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5942a55e367cb329191ce731d764f887.exe
Resource
win7-20231129-en
6 signatures
150 seconds
General
-
Target
5942a55e367cb329191ce731d764f887.exe
-
Size
1.1MB
-
MD5
5942a55e367cb329191ce731d764f887
-
SHA1
acad769ba56159d9bd9b8ec97f3313001fc8dcae
-
SHA256
3b8862c7404919e63ee8fd399fa3bd2f5b046bb9f9351946688972c7752c2306
-
SHA512
ea04613054813bd34798aa7cec3fa7bd88b46e84781a9bb9805567857548568e348bd146e0bb7c240c02ee153d98104dfe7d6bcafdbead9ef1496038e6128d74
-
SSDEEP
24576:i4oKmf5R/pOCuxGU13IlBwaa6NKHb/JGkYI/8UZ:i4uv/pOCIGk3Ivwaa6IHz0kYM8U
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2912 5942a55e367cb329191ce731d764f887.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~2\is259398290.log 5942a55e367cb329191ce731d764f887.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Internet Explorer\Main 5942a55e367cb329191ce731d764f887.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2912 5942a55e367cb329191ce731d764f887.exe 2912 5942a55e367cb329191ce731d764f887.exe