Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-06-2024 03:43
Behavioral task
behavioral1
Sample
8c10e7c8bc43369b046de594a3a5677487cc0b4ce2dc3e1a91d7d80bd0bc13d1.exe
Resource
win7-20240221-en
2 signatures
150 seconds
General
-
Target
8c10e7c8bc43369b046de594a3a5677487cc0b4ce2dc3e1a91d7d80bd0bc13d1.exe
-
Size
9.0MB
-
MD5
5fff2e982bfd2de70934c201d36d7769
-
SHA1
c442b152429b2cb36064ef30b501909731484a8b
-
SHA256
8c10e7c8bc43369b046de594a3a5677487cc0b4ce2dc3e1a91d7d80bd0bc13d1
-
SHA512
d08c66b160667d6c81f87d27a8fd479482a19cf808dbc9796c338818346d658175f62cff1fd0f5a658212c24c2566f2ba0252f34a9d7e2dfabc8a96b42a86f57
-
SSDEEP
196608:naJcDKlFBqZcPzFwDxURK8vyqByLdlf3hRQIgLKN:aODKlFBqauayOclfhRQIG2
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
8c10e7c8bc43369b046de594a3a5677487cc0b4ce2dc3e1a91d7d80bd0bc13d1.exepid process 2804 8c10e7c8bc43369b046de594a3a5677487cc0b4ce2dc3e1a91d7d80bd0bc13d1.exe 2804 8c10e7c8bc43369b046de594a3a5677487cc0b4ce2dc3e1a91d7d80bd0bc13d1.exe