Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
06-06-2024 03:41
Behavioral task
behavioral1
Sample
3a352d5e637563f5c87ed4eb2f72f8188f3d9cbdac9c87f87386b4d756ca6e70.exe
Resource
win7-20240508-en
2 signatures
150 seconds
General
-
Target
3a352d5e637563f5c87ed4eb2f72f8188f3d9cbdac9c87f87386b4d756ca6e70.exe
-
Size
9.0MB
-
MD5
6c9af57d3fccae417ae739a752f494c2
-
SHA1
8f51d90171176bd23caf374271e675d7f240d233
-
SHA256
3a352d5e637563f5c87ed4eb2f72f8188f3d9cbdac9c87f87386b4d756ca6e70
-
SHA512
d4e87ffd9d7b2c64c048eb73df4c6d58a119ce8033d1fb08ae55d627ff8b37644464427ccb50f08ca8056524b24f2a5b599ece1aa7b6aaf46a7aabc5e1d32910
-
SSDEEP
196608:nxJcDKlFBqlA0wDxURK8vyqByLdlf3hRQIgLKN:xODKlFBqwayOclfhRQIG2
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
3a352d5e637563f5c87ed4eb2f72f8188f3d9cbdac9c87f87386b4d756ca6e70.exepid process 996 3a352d5e637563f5c87ed4eb2f72f8188f3d9cbdac9c87f87386b4d756ca6e70.exe 996 3a352d5e637563f5c87ed4eb2f72f8188f3d9cbdac9c87f87386b4d756ca6e70.exe