Analysis
-
max time kernel
95s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 06:09
Behavioral task
behavioral1
Sample
692239341d4f324e696df612b65d24960b5f9bed1af74bc35db520331b15a57a.exe
Resource
win7-20240729-en
General
-
Target
692239341d4f324e696df612b65d24960b5f9bed1af74bc35db520331b15a57a.exe
-
Size
9.0MB
-
MD5
da0148daa503916718074ea7b190ac0b
-
SHA1
ec3f4b5670be6a3a2aea00a20cf2b0bca575e602
-
SHA256
692239341d4f324e696df612b65d24960b5f9bed1af74bc35db520331b15a57a
-
SHA512
388d722f4894cc05bca59622e08f8e32684b05462a1a7d7dad8dffe55d8555faed2ee7a83fd69a1047c357765d6bdf8caa315e8bde7143bfcb6190d7788e1f88
-
SSDEEP
196608:GaJcDKlFBqZcPzFwDxURK8vyqByLdlf3hRQIgLKN:vODKlFBqauayOclfhRQIG2
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 692239341d4f324e696df612b65d24960b5f9bed1af74bc35db520331b15a57a.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4144 692239341d4f324e696df612b65d24960b5f9bed1af74bc35db520331b15a57a.exe 4144 692239341d4f324e696df612b65d24960b5f9bed1af74bc35db520331b15a57a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\692239341d4f324e696df612b65d24960b5f9bed1af74bc35db520331b15a57a.exe"C:\Users\Admin\AppData\Local\Temp\692239341d4f324e696df612b65d24960b5f9bed1af74bc35db520331b15a57a.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4144