Analysis

  • max time kernel
    92s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-09-2024 03:32

General

  • Target

    eb97052899bb8e9d32865a2b3269122252942286618387278279d792b13dfd72.exe

  • Size

    8.5MB

  • MD5

    8d53eb752c4c26795c3cc334c9a64611

  • SHA1

    f1a3d4a4a1110d616ad82bdb64d98b011adc00c7

  • SHA256

    eb97052899bb8e9d32865a2b3269122252942286618387278279d792b13dfd72

  • SHA512

    f501f8eee32ec863aa061be6fe07e382e38adeaa20b110792310f457af4591dec289145a7f10b6aa5023d5143e773312c5c5a4c078286d8604feb689db288e99

  • SSDEEP

    196608:qa+ZIGwdfbWgPfZ0nwsiBOCaepkvxEcBqc2xHFJLc04ylx40tk:mZIGwdfjhTsigHvxE9c2xH/crylx402

Malware Config

Signatures

  • An open source browser data exporter written in golang. 6 IoCs
  • HackBrowserData

    An open source golang web browser extractor.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

Processes

  • C:\Users\Admin\AppData\Local\Temp\eb97052899bb8e9d32865a2b3269122252942286618387278279d792b13dfd72.exe
    "C:\Users\Admin\AppData\Local\Temp\eb97052899bb8e9d32865a2b3269122252942286618387278279d792b13dfd72.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:1648

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Session Storage_8.temp\CURRENT

    Filesize

    16B

    MD5

    46295cac801e5d4857d09837238a6394

    SHA1

    44e0fa1b517dbf802b18faf0785eeea6ac51594b

    SHA256

    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

    SHA512

    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

  • C:\Users\Admin\AppData\Local\Temp\Session Storage_8.temp\MANIFEST-000001

    Filesize

    41B

    MD5

    5af87dfd673ba2115e2fcf5cfdb727ab

    SHA1

    d5b5bbf396dc291274584ef71f444f420b6056f1

    SHA256

    f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

    SHA512

    de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

  • memory/1648-9-0x00007FFF466D0000-0x00007FFF468C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1648-3-0x00000000009A0000-0x00000000026CE000-memory.dmp

    Filesize

    29.2MB

  • memory/1648-4-0x00000000009A0000-0x00000000026CE000-memory.dmp

    Filesize

    29.2MB

  • memory/1648-7-0x00007FFF4676D000-0x00007FFF4676E000-memory.dmp

    Filesize

    4KB

  • memory/1648-0-0x00000000009A0000-0x00000000026CE000-memory.dmp

    Filesize

    29.2MB

  • memory/1648-8-0x00007FFF466D0000-0x00007FFF468C5000-memory.dmp

    Filesize

    2.0MB

  • memory/1648-5-0x00000000009A0000-0x00000000026CE000-memory.dmp

    Filesize

    29.2MB

  • memory/1648-6-0x00000000009A0000-0x00000000026CE000-memory.dmp

    Filesize

    29.2MB

  • memory/1648-2-0x00000000009A0000-0x00000000026CE000-memory.dmp

    Filesize

    29.2MB

  • memory/1648-1-0x00007FF4E6810000-0x00007FF4E6BE1000-memory.dmp

    Filesize

    3.8MB

  • memory/1648-84-0x00007FF4E6810000-0x00007FF4E6BE1000-memory.dmp

    Filesize

    3.8MB

  • memory/1648-83-0x00000000009A0000-0x00000000026CE000-memory.dmp

    Filesize

    29.2MB

  • memory/1648-85-0x00007FFF466D0000-0x00007FFF468C5000-memory.dmp

    Filesize

    2.0MB