Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03-04-2024 07:03
Behavioral task
behavioral1
Sample
c69e9d6f0817059bd9605dcbb73b36571f11809859706617aca5332fec33b1b8.exe
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
General
-
Target
c69e9d6f0817059bd9605dcbb73b36571f11809859706617aca5332fec33b1b8.exe
-
Size
9.0MB
-
MD5
7c3254ab4ec13ff4618807e027b91267
-
SHA1
0f45443c62827adfb65a73666d4c5cec91bbcc01
-
SHA256
c69e9d6f0817059bd9605dcbb73b36571f11809859706617aca5332fec33b1b8
-
SHA512
216ca462e10d4f1143e2f6e4d0775defcf8da680f2d20829b4996140456924844c69692b141398ab1b6e55f3603e0eb404c9749f8c76e1b4687c7f6a5a1ebb11
-
SSDEEP
196608:n0JcDKlFBqZcPzFwDxURK8vyqByLdlf3hRQIgLKN:0ODKlFBqauayOclfhRQIG2
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
c69e9d6f0817059bd9605dcbb73b36571f11809859706617aca5332fec33b1b8.exepid process 2068 c69e9d6f0817059bd9605dcbb73b36571f11809859706617aca5332fec33b1b8.exe 2068 c69e9d6f0817059bd9605dcbb73b36571f11809859706617aca5332fec33b1b8.exe