Resubmissions
11/04/2024, 17:35
240411-v56xysbg2t 7Analysis
-
max time kernel
117s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2024, 17:35
Static task
static1
Behavioral task
behavioral1
Sample
Setup.exe
Resource
win7-20240215-en
4 signatures
150 seconds
General
-
Target
Setup.exe
-
Size
3.2MB
-
MD5
cbd28dd5f9bdb848926726b172124751
-
SHA1
2854cf38e373a60a14927422c5a9de242695ce5b
-
SHA256
275be7d414498ed841232cee005cb97dfc1c22977b841b72d674959629d5ce02
-
SHA512
cc94dd7f248e0c539b75de318f5d9c2a25099e3d205beb437e426628c5170443ae68b275cab8870c042ea15d71367997633f592bbb761e9299a29a02f1b25fe3
-
SSDEEP
49152:9DWX6UQASeBylX01L6FXA3XcNd2rcX9gUKkDg3PsFNBwi4clntJlMKWr/SALAqWy:9uWA+X4cjXki4clntJiKWz7LArcz
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4284 Setup.exe 4284 Setup.exe 4284 Setup.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4284 Setup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:4284
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3104