Analysis

  • max time kernel
    95s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-10-2024 08:22

General

  • Target

    2aef4cdf8846df0a35071e56e41c732b6259fbd2af6a288f81c9ce0fc1e7bcc3.exe

  • Size

    11.9MB

  • MD5

    51ee7c8663cd612fb83b3b6e35ff8277

  • SHA1

    56bc5a66bbf1f4ba483b3e8c7b28c3dc48a642a0

  • SHA256

    2aef4cdf8846df0a35071e56e41c732b6259fbd2af6a288f81c9ce0fc1e7bcc3

  • SHA512

    e749714d4a5246dc77ebd0e8189bac5c8915687c0bba8fa827cd6c91d5027e0df43034554c5e9f85bf2bf9bc7d700c9c884533d1df8e0a0dba3dc6ec5665f53d

  • SSDEEP

    196608:vSB2RFhgKUkVtFpNAMNwJGOV7JFI1xIgEcCrWpUhUsYbypZhQIY3lB6:vY2VTyMNmGO3FMxNCrWpRMZM1B

Malware Config

Signatures

  • An open source browser data exporter written in golang. 6 IoCs
  • HackBrowserData

    An open source golang web browser extractor.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • GoLang User-Agent 1 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

Processes

  • C:\Users\Admin\AppData\Local\Temp\2aef4cdf8846df0a35071e56e41c732b6259fbd2af6a288f81c9ce0fc1e7bcc3.exe
    "C:\Users\Admin\AppData\Local\Temp\2aef4cdf8846df0a35071e56e41c732b6259fbd2af6a288f81c9ce0fc1e7bcc3.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:4152

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Session Storage_8.temp\CURRENT

    Filesize

    16B

    MD5

    46295cac801e5d4857d09837238a6394

    SHA1

    44e0fa1b517dbf802b18faf0785eeea6ac51594b

    SHA256

    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

    SHA512

    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

  • C:\Users\Admin\AppData\Local\Temp\Session Storage_8.temp\MANIFEST-000001

    Filesize

    41B

    MD5

    5af87dfd673ba2115e2fcf5cfdb727ab

    SHA1

    d5b5bbf396dc291274584ef71f444f420b6056f1

    SHA256

    f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

    SHA512

    de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

  • memory/4152-0-0x0000000000C50000-0x00000000031A2000-memory.dmp

    Filesize

    37.3MB

  • memory/4152-2-0x00007FF41F780000-0x00007FF41FB51000-memory.dmp

    Filesize

    3.8MB

  • memory/4152-1-0x0000000000C50000-0x00000000031A2000-memory.dmp

    Filesize

    37.3MB

  • memory/4152-3-0x0000000000C50000-0x00000000031A2000-memory.dmp

    Filesize

    37.3MB

  • memory/4152-4-0x0000000000C50000-0x00000000031A2000-memory.dmp

    Filesize

    37.3MB

  • memory/4152-5-0x0000000000C50000-0x00000000031A2000-memory.dmp

    Filesize

    37.3MB

  • memory/4152-7-0x00007FFA6AA70000-0x00007FFA6AA80000-memory.dmp

    Filesize

    64KB

  • memory/4152-6-0x0000000000C50000-0x00000000031A2000-memory.dmp

    Filesize

    37.3MB

  • memory/4152-92-0x00007FF41F780000-0x00007FF41FB51000-memory.dmp

    Filesize

    3.8MB

  • memory/4152-91-0x0000000000C50000-0x00000000031A2000-memory.dmp

    Filesize

    37.3MB