Resubmissions
21-05-2024 15:24
240521-stjxyaad7x 10Analysis
-
max time kernel
136s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 15:24
Behavioral task
behavioral1
Sample
307d7e18c98eb43dc46eda003d13dd21c36dca49422150c0e1e29c811ee92335.exe
Resource
win7-20240220-en
windows7-x64
2 signatures
150 seconds
General
-
Target
307d7e18c98eb43dc46eda003d13dd21c36dca49422150c0e1e29c811ee92335.exe
-
Size
9.0MB
-
MD5
df070159f708520c5bb7a607ad4ac232
-
SHA1
7008fa700b073282159b7bc527814fafd5d236c5
-
SHA256
307d7e18c98eb43dc46eda003d13dd21c36dca49422150c0e1e29c811ee92335
-
SHA512
72e0e4b0d87315bd969f0d53db4f468717570279dee1a9c4e72697831c22f539927a37384d84b3b6dd7943af8ac1997bda627acbc30f9d2b050d20aac0cd4eb7
-
SSDEEP
196608:n2JcDKlFBqZcPzFwDxURK8vyqByLdlf3hRQIgLKN:2ODKlFBqauayOclfhRQIG2
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
307d7e18c98eb43dc46eda003d13dd21c36dca49422150c0e1e29c811ee92335.exepid process 3560 307d7e18c98eb43dc46eda003d13dd21c36dca49422150c0e1e29c811ee92335.exe 3560 307d7e18c98eb43dc46eda003d13dd21c36dca49422150c0e1e29c811ee92335.exe