Analysis
-
max time kernel
135s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 15:09
Behavioral task
behavioral1
Sample
0afcf2618c13c2b8227ae79d285af9f39adbb05d24d1a51eeea5ec515716b008.exe
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
General
-
Target
0afcf2618c13c2b8227ae79d285af9f39adbb05d24d1a51eeea5ec515716b008.exe
-
Size
9.0MB
-
MD5
381d0007b5efe91a979a7a857900a734
-
SHA1
2a075f5d6441e1ad5128c5ee0f619445a90fa68f
-
SHA256
0afcf2618c13c2b8227ae79d285af9f39adbb05d24d1a51eeea5ec515716b008
-
SHA512
7fa6c0673cc71dae20df94b31228094c2f13fbe3e90634315a384c3b162298d73b30e28bd66d152499c239dd6581eb3a1fc37d5cc58decd99b9ae9bf2ab287dd
-
SSDEEP
196608:z5JcDKlFBqZcPzFwDxyZ38hK0yqByLdlf3hRQIgLKN:NODKlFBqauN/yOclfhRQIG2
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
0afcf2618c13c2b8227ae79d285af9f39adbb05d24d1a51eeea5ec515716b008.exepid process 2396 0afcf2618c13c2b8227ae79d285af9f39adbb05d24d1a51eeea5ec515716b008.exe 2396 0afcf2618c13c2b8227ae79d285af9f39adbb05d24d1a51eeea5ec515716b008.exe