Analysis
-
max time kernel
133s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 14:29
Behavioral task
behavioral1
Sample
1b7a7ba3fc71385e960acfd7d2fc24159dfba4e24be211c209b7c99f56ea77f8.exe
Resource
win7-20240508-en
windows7-x64
2 signatures
150 seconds
General
-
Target
1b7a7ba3fc71385e960acfd7d2fc24159dfba4e24be211c209b7c99f56ea77f8.exe
-
Size
7.2MB
-
MD5
50f93dce86f8e8517708acfb5521ffb0
-
SHA1
abf5155714bd3499187cc1105f96d6bc4f91d57c
-
SHA256
1b7a7ba3fc71385e960acfd7d2fc24159dfba4e24be211c209b7c99f56ea77f8
-
SHA512
272d69d0131c17721199cf6b2780019e64c17c7c9eba6c8c068392ff0b95098037ccfb3fda7f73ad2645cb326668739a508017e3f2577fd3df4767cc51dcdcdc
-
SSDEEP
196608:9D0JcDKlFBqZcPz0RK85Xs5XvyCMYpr/nGLtwN:Z0ODKlFBqakXsBvyCpLGLtw
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
1b7a7ba3fc71385e960acfd7d2fc24159dfba4e24be211c209b7c99f56ea77f8.exepid process 2280 1b7a7ba3fc71385e960acfd7d2fc24159dfba4e24be211c209b7c99f56ea77f8.exe 2280 1b7a7ba3fc71385e960acfd7d2fc24159dfba4e24be211c209b7c99f56ea77f8.exe