Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-06-2024 02:57

General

  • Target

    f46ecf1dbdaac07402a57b34ec48c296acde32db8ffdcdb53e790fe8aeed55af.exe

  • Size

    9.0MB

  • MD5

    182065447d672c32d8bc5ed1ffa2d196

  • SHA1

    b700b660a17677239758e13e11dd1f89da6e8243

  • SHA256

    f46ecf1dbdaac07402a57b34ec48c296acde32db8ffdcdb53e790fe8aeed55af

  • SHA512

    198cfcb7ffdab35abf151b873b6f0c19db4326215813b4e08234b091725dc625cfc1d26f487c3920edde92bf407e508cdf3898f3f0b106d7085b6fd01adde4c1

  • SSDEEP

    196608:ngJcDKlFBqZcPzFwDxURK8vyqByLdlf3hRQIgLKN:gODKlFBqauayOclfhRQIG2

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f46ecf1dbdaac07402a57b34ec48c296acde32db8ffdcdb53e790fe8aeed55af.exe
    "C:\Users\Admin\AppData\Local\Temp\f46ecf1dbdaac07402a57b34ec48c296acde32db8ffdcdb53e790fe8aeed55af.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads