Analysis
-
max time kernel
129s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 19:56
Behavioral task
behavioral1
Sample
20499f3254f165f961f9b9e3ef046d1df8398eaca1828f74cb459f642cce1ea2.exe
Resource
win7-20240508-en
windows7-x64
2 signatures
150 seconds
General
-
Target
20499f3254f165f961f9b9e3ef046d1df8398eaca1828f74cb459f642cce1ea2.exe
-
Size
9.0MB
-
MD5
6653a690faec54b0f03edb48ce214fad
-
SHA1
d033e45222f0b9f949a2c786453e3896e6b6bc31
-
SHA256
20499f3254f165f961f9b9e3ef046d1df8398eaca1828f74cb459f642cce1ea2
-
SHA512
b3f3ad0e91f543776ca38aa8890dad23e0075d44c758bf013e287258748008a07a84e8d1920223879c3f0f3a3dbea6cba8849820228375896820881396e4dd86
-
SSDEEP
196608:n2JcDKlFBqlA0wDxURK8vyqByLdlf3hRQIgLKN:2ODKlFBqwayOclfhRQIG2
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
20499f3254f165f961f9b9e3ef046d1df8398eaca1828f74cb459f642cce1ea2.exepid process 4220 20499f3254f165f961f9b9e3ef046d1df8398eaca1828f74cb459f642cce1ea2.exe 4220 20499f3254f165f961f9b9e3ef046d1df8398eaca1828f74cb459f642cce1ea2.exe