Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22/05/2024, 17:49
Behavioral task
behavioral1
Sample
307d7e18c98eb43dc46eda003d13dd21c36dca49422150c0e1e29c811ee92335.exe
Resource
win7-20240221-en
2 signatures
150 seconds
General
-
Target
307d7e18c98eb43dc46eda003d13dd21c36dca49422150c0e1e29c811ee92335.exe
-
Size
9.0MB
-
MD5
df070159f708520c5bb7a607ad4ac232
-
SHA1
7008fa700b073282159b7bc527814fafd5d236c5
-
SHA256
307d7e18c98eb43dc46eda003d13dd21c36dca49422150c0e1e29c811ee92335
-
SHA512
72e0e4b0d87315bd969f0d53db4f468717570279dee1a9c4e72697831c22f539927a37384d84b3b6dd7943af8ac1997bda627acbc30f9d2b050d20aac0cd4eb7
-
SSDEEP
196608:n2JcDKlFBqZcPzFwDxURK8vyqByLdlf3hRQIgLKN:2ODKlFBqauayOclfhRQIG2
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4140 307d7e18c98eb43dc46eda003d13dd21c36dca49422150c0e1e29c811ee92335.exe 4140 307d7e18c98eb43dc46eda003d13dd21c36dca49422150c0e1e29c811ee92335.exe