Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05/07/2024, 05:21
Behavioral task
behavioral1
Sample
4760ece94a2567d81327535ff5d3b7ce8bd0afbe9165b794322290525906395e.exe
Resource
win7-20240704-en
2 signatures
150 seconds
General
-
Target
4760ece94a2567d81327535ff5d3b7ce8bd0afbe9165b794322290525906395e.exe
-
Size
9.0MB
-
MD5
e9b00a88ad0833329bf24eb83d6e2170
-
SHA1
f9ea9b34ad52573aaa4e335897225245fe5f6979
-
SHA256
4760ece94a2567d81327535ff5d3b7ce8bd0afbe9165b794322290525906395e
-
SHA512
c5234a8678db599be290dfaf74448f426e7e7bfefaab635f8c5f25e0f35818ff04574fbf455449c3c909bc48d7287ed6254d7e7cfbde5580b4f0553e22cf83fd
-
SSDEEP
196608:nfJcDKlFBqkwDxURK8vyqByLdlf3hRQIgLKN:fODKlFBqHayOclfhRQIG2
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2936 4760ece94a2567d81327535ff5d3b7ce8bd0afbe9165b794322290525906395e.exe 2936 4760ece94a2567d81327535ff5d3b7ce8bd0afbe9165b794322290525906395e.exe