Analysis
-
max time kernel
147s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
08-01-2024 07:27
Static task
static1
Behavioral task
behavioral1
Sample
4acf940b3a05c746fec4aa6147158475.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4acf940b3a05c746fec4aa6147158475.exe
Resource
win10v2004-20231215-en
General
-
Target
4acf940b3a05c746fec4aa6147158475.exe
-
Size
48KB
-
MD5
4acf940b3a05c746fec4aa6147158475
-
SHA1
eb5aeecc50573a30697eea0ea5afa16f31fe1b98
-
SHA256
98be18f6c86f24977e9e06ad997ba9692f74a5953b31405da55dca22070b932a
-
SHA512
bd89b887a6e58fa8cc6cf19cea069a28a8eb54cca0c17781e3c6cc3f5b947ab51a27888d7c0e4986f6c482a6d13edf97f413f3d71a920b4d67f28e93ba3b16d6
-
SSDEEP
768:9kwQnOQP6mx2xiC5CTq/chlzvamyaCeJUSN5P:9kwgdP6kZC5sqYza+USfP
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbthost = "C:\\Users\\Admin\\AppData\\Roaming\\4acf940b3a05c746fec4aa6147158475.exe" 4acf940b3a05c746fec4aa6147158475.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 756 4acf940b3a05c746fec4aa6147158475.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108B
MD5aafee873e4e958931627ce70d1f0a8b0
SHA153cb7dd1635b97d56a6fa6ae7622031667714c5a
SHA256bd9c0aa84e1fb26b4c5b25d3b1cddf33cafbf1f5b1b3a9376f8b3a26ac2f0f52
SHA51213e50945331c259a1eceddfd2b3ac1f651ee5ba7147bef15389f68db70fc8fa6d6714b8d077568ca8dfa18fc375bd6a630b0f96eefe4369d77e7c965db34cc36