Analysis
-
max time kernel
29s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2024, 20:30
Behavioral task
behavioral1
Sample
de4da24486f406177afea313e60468918398dbbdb3551a7290a4050966494728.exe
Resource
win7-20231215-en
6 signatures
150 seconds
General
-
Target
de4da24486f406177afea313e60468918398dbbdb3551a7290a4050966494728.exe
-
Size
3.5MB
-
MD5
b91097bff5f741a965eb80edfcc97b0b
-
SHA1
fdebe47b69442a312c1008c7a5ee71b3f41b4a68
-
SHA256
de4da24486f406177afea313e60468918398dbbdb3551a7290a4050966494728
-
SHA512
21b96d15a463a5cdc7e2016a8a1e1cf636b1c4d13343f66fdcad24deecba56a29797600701ac3a382133ca585c89eb81fab085853991c19ccf245ff11de91514
-
SSDEEP
49152:JAdGB73ejP3+EMfRdASVaAvrC5Xh602+:JAgR3epMjASHch
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
Processes
-
C:\Users\Admin\AppData\Local\Temp\de4da24486f406177afea313e60468918398dbbdb3551a7290a4050966494728.exe"C:\Users\Admin\AppData\Local\Temp\de4da24486f406177afea313e60468918398dbbdb3551a7290a4050966494728.exe"1⤵PID:3896
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:2088