Analysis
-
max time kernel
138s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2024, 05:02
Static task
static1
Behavioral task
behavioral1
Sample
24c76871e844d80ed4b9622853ba3492.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
24c76871e844d80ed4b9622853ba3492.exe
Resource
win10v2004-20240709-en
General
-
Target
24c76871e844d80ed4b9622853ba3492.exe
-
Size
6.7MB
-
MD5
24c76871e844d80ed4b9622853ba3492
-
SHA1
df3395f4d49a3a9e680cedd6af46220dc048e239
-
SHA256
c4cfe8587360a3fa73fa5cb09ec3bcf55a21d8991d42af77d2bf93fef83d5e97
-
SHA512
ddade4fe65a8189fc8fdd8ac452a80abf0d102c2ed72c79d98831c6f784177db74adb338289da1b90ef9bbfd7c614793a455ce1a2f1924fff8886c15af1d7fda
-
SSDEEP
98304:uYuTbLi9oqTRXpP5OdiB73Q07pVTjrc/eEz0/phh1lQ:lQaJl8CQGpVQ/eW0/dnQ
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1264 24c76871e844d80ed4b9622853ba3492.exe 1264 24c76871e844d80ed4b9622853ba3492.exe