Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-06-2024 02:57
Behavioral task
behavioral1
Sample
f46ecf1dbdaac07402a57b34ec48c296acde32db8ffdcdb53e790fe8aeed55af.exe
Resource
win7-20240508-en
2 signatures
150 seconds
General
-
Target
f46ecf1dbdaac07402a57b34ec48c296acde32db8ffdcdb53e790fe8aeed55af.exe
-
Size
9.0MB
-
MD5
182065447d672c32d8bc5ed1ffa2d196
-
SHA1
b700b660a17677239758e13e11dd1f89da6e8243
-
SHA256
f46ecf1dbdaac07402a57b34ec48c296acde32db8ffdcdb53e790fe8aeed55af
-
SHA512
198cfcb7ffdab35abf151b873b6f0c19db4326215813b4e08234b091725dc625cfc1d26f487c3920edde92bf407e508cdf3898f3f0b106d7085b6fd01adde4c1
-
SSDEEP
196608:ngJcDKlFBqZcPzFwDxURK8vyqByLdlf3hRQIgLKN:gODKlFBqauayOclfhRQIG2
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
f46ecf1dbdaac07402a57b34ec48c296acde32db8ffdcdb53e790fe8aeed55af.exepid process 1736 f46ecf1dbdaac07402a57b34ec48c296acde32db8ffdcdb53e790fe8aeed55af.exe 1736 f46ecf1dbdaac07402a57b34ec48c296acde32db8ffdcdb53e790fe8aeed55af.exe