Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
25/06/2024, 04:59
Behavioral task
behavioral1
Sample
decbd1764e8583f64a33ddacc5c592a95fea4b49e9abe4faaefe56183e74ef2c.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
decbd1764e8583f64a33ddacc5c592a95fea4b49e9abe4faaefe56183e74ef2c.exe
Resource
win10v2004-20240226-en
General
-
Target
decbd1764e8583f64a33ddacc5c592a95fea4b49e9abe4faaefe56183e74ef2c.exe
-
Size
9.0MB
-
MD5
4cfdb464d310eac3384c2a3cdb757118
-
SHA1
58eddff9f41f081763677002c417022f87863b41
-
SHA256
decbd1764e8583f64a33ddacc5c592a95fea4b49e9abe4faaefe56183e74ef2c
-
SHA512
0ff05c55ffbb2d541f35c3e6ee01b6a15da849bfcf53b77612e046c8ffcf491448f03e35681601a69dd2e590ba31a3d47489ad628e8d44cb6ff2abdd0e1b6fff
-
SSDEEP
196608:nSJcDKlFBqZcPzFwDxURK8vyqByLdlf3hRQIgLKN:SODKlFBqauayOclfhRQIG2
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2172 decbd1764e8583f64a33ddacc5c592a95fea4b49e9abe4faaefe56183e74ef2c.exe 2172 decbd1764e8583f64a33ddacc5c592a95fea4b49e9abe4faaefe56183e74ef2c.exe