Analysis

  • max time kernel
    133s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 14:29

General

  • Target

    1b7a7ba3fc71385e960acfd7d2fc24159dfba4e24be211c209b7c99f56ea77f8.exe

  • Size

    7.2MB

  • MD5

    50f93dce86f8e8517708acfb5521ffb0

  • SHA1

    abf5155714bd3499187cc1105f96d6bc4f91d57c

  • SHA256

    1b7a7ba3fc71385e960acfd7d2fc24159dfba4e24be211c209b7c99f56ea77f8

  • SHA512

    272d69d0131c17721199cf6b2780019e64c17c7c9eba6c8c068392ff0b95098037ccfb3fda7f73ad2645cb326668739a508017e3f2577fd3df4767cc51dcdcdc

  • SSDEEP

    196608:9D0JcDKlFBqZcPz0RK85Xs5XvyCMYpr/nGLtwN:Z0ODKlFBqakXsBvyCpLGLtw

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b7a7ba3fc71385e960acfd7d2fc24159dfba4e24be211c209b7c99f56ea77f8.exe
    "C:\Users\Admin\AppData\Local\Temp\1b7a7ba3fc71385e960acfd7d2fc24159dfba4e24be211c209b7c99f56ea77f8.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2280

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads