Analysis
-
max time kernel
134s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 15:09
Behavioral task
behavioral1
Sample
353c8fbc34efa6a320ee6ee8722b913a1dd7c99e88c1dc1c76f1c6ca45febbdd.exe
Resource
win7-20240508-en
2 signatures
150 seconds
General
-
Target
353c8fbc34efa6a320ee6ee8722b913a1dd7c99e88c1dc1c76f1c6ca45febbdd.exe
-
Size
9.0MB
-
MD5
5acff2bbdf24a8fd16af6f2899ba9eee
-
SHA1
4f2f5d106c8732d123c809c7dc1a7a847f76e93b
-
SHA256
353c8fbc34efa6a320ee6ee8722b913a1dd7c99e88c1dc1c76f1c6ca45febbdd
-
SHA512
00725e82705cf1545534627ac9093e9ca8f807879d9d3b30ad21ae18c3d4146deb4b78a93046d20e518a62bf175ed310e0d9b5ef42a26c11b47f30becbfada4a
-
SSDEEP
196608:nRJcDKlFBqNO+wDxURK8vyqByLdlf3hRQIgLKN:RODKlFBqAZayOclfhRQIG2
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
353c8fbc34efa6a320ee6ee8722b913a1dd7c99e88c1dc1c76f1c6ca45febbdd.exepid process 1876 353c8fbc34efa6a320ee6ee8722b913a1dd7c99e88c1dc1c76f1c6ca45febbdd.exe 1876 353c8fbc34efa6a320ee6ee8722b913a1dd7c99e88c1dc1c76f1c6ca45febbdd.exe