Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
09/01/2024, 05:38
Static task
static1
Behavioral task
behavioral1
Sample
4d7b66232ee9fe172787de31ccd12be1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4d7b66232ee9fe172787de31ccd12be1.exe
Resource
win10v2004-20231222-en
General
-
Target
4d7b66232ee9fe172787de31ccd12be1.exe
-
Size
36KB
-
MD5
4d7b66232ee9fe172787de31ccd12be1
-
SHA1
ace607644c8b0cf16bd31ddb1b6fb9c632895554
-
SHA256
bbf75712ae4256d56c651b70de429f97b9e4022c00ce4e9d9c0fe3125092d419
-
SHA512
e50f8a7e8afd35184ef741b8f156161e6ecf5bdba7daebbedb0e65677ded392d732fd8ac7a01fbb23cdb62102f33d4d94607d54d56ad003538d896b00474fe9a
-
SSDEEP
384:SykJAVNp3F1ngrEmodobJLYlt1c/fOPr35w1jIWkDIHST7WUI:SyX3rTsLYv1c/fOShIvzf
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Run\sbthost = "C:\\Users\\Admin\\AppData\\Roaming\\4d7b66232ee9fe172787de31ccd12be1.exe" 4d7b66232ee9fe172787de31ccd12be1.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 836 4d7b66232ee9fe172787de31ccd12be1.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
118B
MD5779059edd6865ffe1280a465a5205e32
SHA15f121d26be33ebf8fbaaa9999f38e5083bcad74d
SHA25632c6978565837ae50fa172b2712d1a4bc7bad927d635175afdf9f20df01e4276
SHA5121be11e69944a91f899bfa099b32a6248b0d119ff2a6c23fe78e9ccebc1e01ba18894a927921c7e29b08998e0965c46e653e185bc988d3b44373bf10fdd539457