Analysis
-
max time kernel
144s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 06:41
Static task
static1
Behavioral task
behavioral1
Sample
2c0688de386f52eb242cf61da7506d05.exe
Resource
win7-20231215-en
windows7-x64
4 signatures
150 seconds
General
-
Target
2c0688de386f52eb242cf61da7506d05.exe
-
Size
672KB
-
MD5
2c0688de386f52eb242cf61da7506d05
-
SHA1
acbf8fe72134a9a10a2d5d7a292dae129465581d
-
SHA256
0f8cacda879294d585841c2af38d4cce3b0e0b81a7497b2cce2e30445249f511
-
SHA512
ee356777906fc16dd0f93cb320d0e9bf2fc13d0cac79fa742ac12e8407d5b50e708b641d21c6d4bdc44add37de9901210845acd84e3bf366e4af030df1adb96a
-
SSDEEP
12288:FxNPJ97R8HlyyMiFmoaO2w5fXYKtSJ8K0N0hvN9ycqrVUkJpL3KBg7P:FxNPv2HlyyMiFmoaGXBtPK0N0hvNC6KT
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4364 2c0688de386f52eb242cf61da7506d05.exe 4364 2c0688de386f52eb242cf61da7506d05.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4364 2c0688de386f52eb242cf61da7506d05.exe 4364 2c0688de386f52eb242cf61da7506d05.exe