Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
29/05/2024, 23:07
Behavioral task
behavioral1
Sample
59c17ad5f73d2d5a45899e6d93cdc8bbab9f0ac3508136ba585d6bf47749d154.exe
Resource
win7-20240215-en
2 signatures
150 seconds
General
-
Target
59c17ad5f73d2d5a45899e6d93cdc8bbab9f0ac3508136ba585d6bf47749d154.exe
-
Size
9.0MB
-
MD5
2d0238cbb5f607675efa13bcf6da9662
-
SHA1
5b27d74d2fd8d74184e0447b2d630cc4e6779bb3
-
SHA256
59c17ad5f73d2d5a45899e6d93cdc8bbab9f0ac3508136ba585d6bf47749d154
-
SHA512
2106b01442f1c6f451b8142f789f6071358f3c6f63b2d679d1c4ef9659a0851b861f6ccbba1366c1bfefc4da5903b6b5128f892fe512736d6667a3ffa18d6db9
-
SSDEEP
196608:nUJcDKlFBqX9xwDxURK8vyqByLdlf3hRQIgLKN:UODKlFBq4ayOclfhRQIG2
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1200 59c17ad5f73d2d5a45899e6d93cdc8bbab9f0ac3508136ba585d6bf47749d154.exe 1200 59c17ad5f73d2d5a45899e6d93cdc8bbab9f0ac3508136ba585d6bf47749d154.exe