Analysis

  • max time kernel
    132s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/05/2024, 01:41

General

  • Target

    27eaf0608734377aad11a52a40d257212944cd200bfb839ce4cffb2f9051679d.exe

  • Size

    9.0MB

  • MD5

    03b4f619ab6b2eca42fd3f9649915eb8

  • SHA1

    26ddec97f89578c538b762824b8b828dd1e1737c

  • SHA256

    27eaf0608734377aad11a52a40d257212944cd200bfb839ce4cffb2f9051679d

  • SHA512

    065d96c3bdd8436ac01472fb9a4639959602ce476adc1ddad85302b25435f1c79eb7ac135568556f85b5caddc821ccd83328f9bab4fdaf19f0712491a3380566

  • SSDEEP

    196608:nZJcDKlFBqZcPzFwDxURK8vyqByLdlf3hRQIgLKN:ZODKlFBqauayOclfhRQIG2

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\27eaf0608734377aad11a52a40d257212944cd200bfb839ce4cffb2f9051679d.exe
    "C:\Users\Admin\AppData\Local\Temp\27eaf0608734377aad11a52a40d257212944cd200bfb839ce4cffb2f9051679d.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3040

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads