Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-06-2024 10:37
Behavioral task
behavioral1
Sample
d1b9310c6c2ad02c0925959a189caf0b9706b0384a70f7ac6dce3c82adf0e421.exe
Resource
win7-20240221-en
windows7-x64
2 signatures
150 seconds
General
-
Target
d1b9310c6c2ad02c0925959a189caf0b9706b0384a70f7ac6dce3c82adf0e421.exe
-
Size
9.0MB
-
MD5
951b243f991e6daee512cc0fd5c2198f
-
SHA1
670c11b8e1c7dd65348d617e8372f3e0ff74088c
-
SHA256
d1b9310c6c2ad02c0925959a189caf0b9706b0384a70f7ac6dce3c82adf0e421
-
SHA512
1342e3b7660ea4e0f0e6887cfed327524d68c4a07de327b7852fe19cbe8c2d8eee50ee34ad7b70967e94b052d8c5cc7263efab81bfd5004c01537bc4c8ec5b4e
-
SSDEEP
196608:nfJcDKlFBqhGz5wDxURK8vyqByLdlf3hRQIgLKN:fODKlFBqvayOclfhRQIG2
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1924 d1b9310c6c2ad02c0925959a189caf0b9706b0384a70f7ac6dce3c82adf0e421.exe 1924 d1b9310c6c2ad02c0925959a189caf0b9706b0384a70f7ac6dce3c82adf0e421.exe