Analysis

  • max time kernel
    93s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2024 07:03

General

  • Target

    c69e9d6f0817059bd9605dcbb73b36571f11809859706617aca5332fec33b1b8.exe

  • Size

    9.0MB

  • MD5

    7c3254ab4ec13ff4618807e027b91267

  • SHA1

    0f45443c62827adfb65a73666d4c5cec91bbcc01

  • SHA256

    c69e9d6f0817059bd9605dcbb73b36571f11809859706617aca5332fec33b1b8

  • SHA512

    216ca462e10d4f1143e2f6e4d0775defcf8da680f2d20829b4996140456924844c69692b141398ab1b6e55f3603e0eb404c9749f8c76e1b4687c7f6a5a1ebb11

  • SSDEEP

    196608:n0JcDKlFBqZcPzFwDxURK8vyqByLdlf3hRQIgLKN:0ODKlFBqauayOclfhRQIG2

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c69e9d6f0817059bd9605dcbb73b36571f11809859706617aca5332fec33b1b8.exe
    "C:\Users\Admin\AppData\Local\Temp\c69e9d6f0817059bd9605dcbb73b36571f11809859706617aca5332fec33b1b8.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads