Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-09-2024 20:19

General

  • Target

    ead38fce547c6469862fb519732e0295a4c72159ad24b065a6165e613ebd50fd.exe

  • Size

    8.6MB

  • MD5

    daac772e21c3729ae4b4c83a7a48cc74

  • SHA1

    4d4c02ede65e642b6a3d299c83f538b9c2486abe

  • SHA256

    ead38fce547c6469862fb519732e0295a4c72159ad24b065a6165e613ebd50fd

  • SHA512

    3b05c8888d0250f9281f03c37fbf48717722b8f39956eb2dde36e14a8678549dfb4d1bc002f441c9c9fb96e262707b12f88f93e7484e18f8c32fc0c69fba7ee3

  • SSDEEP

    196608:KntEzJSR+wCfXMjAD+k5NL29LyxCx4A+pppcA3fZEdpiWyUQg:KtEEPAbq9LnxOI2y1yUQg

Malware Config

Signatures

  • An open source browser data exporter written in golang. 6 IoCs
  • HackBrowserData

    An open source golang web browser extractor.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ead38fce547c6469862fb519732e0295a4c72159ad24b065a6165e613ebd50fd.exe
    "C:\Users\Admin\AppData\Local\Temp\ead38fce547c6469862fb519732e0295a4c72159ad24b065a6165e613ebd50fd.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:4220

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Local Storage\leveldb_7.temp\CURRENT

    Filesize

    16B

    MD5

    46295cac801e5d4857d09837238a6394

    SHA1

    44e0fa1b517dbf802b18faf0785eeea6ac51594b

    SHA256

    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

    SHA512

    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

  • C:\Users\Admin\AppData\Local\Temp\Local Storage\leveldb_7.temp\MANIFEST-000001

    Filesize

    41B

    MD5

    5af87dfd673ba2115e2fcf5cfdb727ab

    SHA1

    d5b5bbf396dc291274584ef71f444f420b6056f1

    SHA256

    f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

    SHA512

    de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

  • memory/4220-0-0x0000000000D10000-0x0000000002A89000-memory.dmp

    Filesize

    29.5MB

  • memory/4220-1-0x00007FF420770000-0x00007FF420B41000-memory.dmp

    Filesize

    3.8MB

  • memory/4220-4-0x0000000000D10000-0x0000000002A89000-memory.dmp

    Filesize

    29.5MB

  • memory/4220-3-0x0000000000D10000-0x0000000002A89000-memory.dmp

    Filesize

    29.5MB

  • memory/4220-2-0x0000000000D10000-0x0000000002A89000-memory.dmp

    Filesize

    29.5MB

  • memory/4220-5-0x0000000000D10000-0x0000000002A89000-memory.dmp

    Filesize

    29.5MB

  • memory/4220-7-0x00007FFDA20A0000-0x00007FFDA20B0000-memory.dmp

    Filesize

    64KB

  • memory/4220-6-0x0000000000D10000-0x0000000002A89000-memory.dmp

    Filesize

    29.5MB

  • memory/4220-84-0x00007FF420770000-0x00007FF420B41000-memory.dmp

    Filesize

    3.8MB

  • memory/4220-85-0x0000000000D10000-0x0000000002A89000-memory.dmp

    Filesize

    29.5MB