Analysis
-
max time kernel
0s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 23:18
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
06b3cbd52d502c676db8b42001d38692.exe
Resource
win7-20231215-en
5 signatures
150 seconds
General
-
Target
06b3cbd52d502c676db8b42001d38692.exe
-
Size
36KB
-
MD5
06b3cbd52d502c676db8b42001d38692
-
SHA1
8446de8b07fcb8e4ec24d895fda2c2c33f5ce7d8
-
SHA256
343fae5e5bf25b278a74c8dc57d672ffd7cf5f54a3d061d651b385df2c900c7e
-
SHA512
4ba9a94a839e4c21b2317343d1df704524922d85bf1832dda2f7f1cfcff9cf11ae745de0387adef7e0e05fbd77618c2040dacae518a89943b55e9e7144e8505b
-
SSDEEP
384:YS4D6rHawTTpfxMaMM/NJE5NQ4b9GeQCLOl/UNZLWndnDdyEyLxr6r:g6vTpJMaMcvUNQ8tQCLOazOJsT96
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1996 06b3cbd52d502c676db8b42001d38692.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\06b3cbd52d502c676db8b42001d38692.exe"C:\Users\Admin\AppData\Local\Temp\06b3cbd52d502c676db8b42001d38692.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:1996
-
C:\Program Files (x86)\Internet Explorer\ielowutil.exe"C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding1⤵PID:2916
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -Embedding1⤵PID:4436
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4436 CREDAT:17410 /prefetch:22⤵PID:2368
-