Analysis

  • max time kernel
    135s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/05/2024, 20:26

General

  • Target

    863aca1efb5fb8bcc9e5f413d4a00fd99c7618966c10c10a6a17295203e1d0bc.exe

  • Size

    9.0MB

  • MD5

    4cfa2de17b3e6a7fd1d13b44d336c80d

  • SHA1

    c5450ac841ca7e0054ca534daee3f868120c8311

  • SHA256

    863aca1efb5fb8bcc9e5f413d4a00fd99c7618966c10c10a6a17295203e1d0bc

  • SHA512

    36bd654c667de50d2b8cf4ddb3aa42f5470b401832126e6bfc9eb2271dd9cd0ae0421f9bc649fcc81d57f610980d934ec09a82e9419cb29b2f905f307dd01d6e

  • SSDEEP

    196608:nVJcDKlFBqkwDxURK8vyqByLdlf3hRQIgLKN:VODKlFBqHayOclfhRQIG2

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\863aca1efb5fb8bcc9e5f413d4a00fd99c7618966c10c10a6a17295203e1d0bc.exe
    "C:\Users\Admin\AppData\Local\Temp\863aca1efb5fb8bcc9e5f413d4a00fd99c7618966c10c10a6a17295203e1d0bc.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3772

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads