Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-06-2024 03:48
Behavioral task
behavioral1
Sample
316219bb192c248a5ae1f5ca4f0674953112fb62bd055dd62871afc55ee5a3ed.exe
Resource
win7-20240221-en
2 signatures
150 seconds
General
-
Target
316219bb192c248a5ae1f5ca4f0674953112fb62bd055dd62871afc55ee5a3ed.exe
-
Size
9.0MB
-
MD5
e6157751b50b35b081ff7e24343e701d
-
SHA1
86a24d55034657dbc535d9f7bfb86aa4b75de266
-
SHA256
316219bb192c248a5ae1f5ca4f0674953112fb62bd055dd62871afc55ee5a3ed
-
SHA512
49137052c868ccba3ee3c168a6669dbf886d7cf5e74ff1c9997b78f2155351593f11c7ffb4c738c5ef5cfa2cbdc25c193f8dc81270d23170d8b37794d7f1068d
-
SSDEEP
196608:n9JcDKlFBqZcPzFwDxURK8vyqByLdlf3hRQIgLKN:9ODKlFBqauayOclfhRQIG2
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
316219bb192c248a5ae1f5ca4f0674953112fb62bd055dd62871afc55ee5a3ed.exepid process 1948 316219bb192c248a5ae1f5ca4f0674953112fb62bd055dd62871afc55ee5a3ed.exe 1948 316219bb192c248a5ae1f5ca4f0674953112fb62bd055dd62871afc55ee5a3ed.exe