Analysis
-
max time kernel
141s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10/08/2024, 17:52
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
8750ba07.exe
Resource
win7-20240704-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
8750ba07.exe
Resource
win10v2004-20240802-en
4 signatures
150 seconds
General
-
Target
8750ba07.exe
-
Size
2.3MB
-
MD5
8413f6421b15ae41e58bf10d4b2fb550
-
SHA1
b21a3b3c064df9e378054a72e113437c4dee23d9
-
SHA256
8750ba07b93783f47c3f95c41996bc13026bd4fd44ec3ba04795650a011d1a7c
-
SHA512
04ef82a25384014b581042ee867c9439a8ef7ccc3f1420680671b0dc2d39ab76cd02e563d0ed3b22c34c340ce27504ddce0bb1dd3920283a7e00ee8a56e1b191
-
SSDEEP
24576:TsPMDbdfEsnPReYlkvVuw6unhAHOAbAtaA7k/z3uAVQ97oWFleQn65TERTsulR/r:TIMDbdfEskYlk4w6SStVQ+W3VBVs
Score
7/10
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MsEdge = "C:\\Users\\Admin\\AppData\\Roaming\\homSt\\8750ba07.exe" 8750ba07.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1176 8750ba07.exe 1176 8750ba07.exe 1176 8750ba07.exe 1176 8750ba07.exe