Analysis
-
max time kernel
135s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 20:26
Behavioral task
behavioral1
Sample
863aca1efb5fb8bcc9e5f413d4a00fd99c7618966c10c10a6a17295203e1d0bc.exe
Resource
win7-20240221-en
2 signatures
150 seconds
General
-
Target
863aca1efb5fb8bcc9e5f413d4a00fd99c7618966c10c10a6a17295203e1d0bc.exe
-
Size
9.0MB
-
MD5
4cfa2de17b3e6a7fd1d13b44d336c80d
-
SHA1
c5450ac841ca7e0054ca534daee3f868120c8311
-
SHA256
863aca1efb5fb8bcc9e5f413d4a00fd99c7618966c10c10a6a17295203e1d0bc
-
SHA512
36bd654c667de50d2b8cf4ddb3aa42f5470b401832126e6bfc9eb2271dd9cd0ae0421f9bc649fcc81d57f610980d934ec09a82e9419cb29b2f905f307dd01d6e
-
SSDEEP
196608:nVJcDKlFBqkwDxURK8vyqByLdlf3hRQIgLKN:VODKlFBqHayOclfhRQIG2
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3772 863aca1efb5fb8bcc9e5f413d4a00fd99c7618966c10c10a6a17295203e1d0bc.exe 3772 863aca1efb5fb8bcc9e5f413d4a00fd99c7618966c10c10a6a17295203e1d0bc.exe