Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 20:02
Behavioral task
behavioral1
Sample
7eace4edb2d30efc59c7558818069bd00c4474b96516e8c58d84b2a41f0e42bf.exe
Resource
win7-20240419-en
windows7-x64
2 signatures
150 seconds
General
-
Target
7eace4edb2d30efc59c7558818069bd00c4474b96516e8c58d84b2a41f0e42bf.exe
-
Size
9.0MB
-
MD5
ac548408517d3234a2393fb17485ce09
-
SHA1
4e4dbe7100a469ab087770c465ef4efd22154b7b
-
SHA256
7eace4edb2d30efc59c7558818069bd00c4474b96516e8c58d84b2a41f0e42bf
-
SHA512
9cef66477e2dd546fdf3462cdfd28b978e931d2e1b2ac37ce9b5166ce3cee4bc420a22b3330985a3131bca9605628a51ecc7687d22f5f271f66a678ccd982036
-
SSDEEP
196608:nkJcDKlFBqZcPzFwDxURK8vyqByLdlf3hRQIgLKN:kODKlFBqauayOclfhRQIG2
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
7eace4edb2d30efc59c7558818069bd00c4474b96516e8c58d84b2a41f0e42bf.exepid process 1824 7eace4edb2d30efc59c7558818069bd00c4474b96516e8c58d84b2a41f0e42bf.exe 1824 7eace4edb2d30efc59c7558818069bd00c4474b96516e8c58d84b2a41f0e42bf.exe