Analysis
-
max time kernel
95s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 02:10
Behavioral task
behavioral1
Sample
acf88f80055908ced219ba8c7ada933fda1b6861800e156e64491ab9077842eb.exe
Resource
win7-20240708-en
General
-
Target
acf88f80055908ced219ba8c7ada933fda1b6861800e156e64491ab9077842eb.exe
-
Size
34KB
-
MD5
39e7dc7f0cfa0ef6b646e794161d91a7
-
SHA1
d2459e4a0b2559937e4d3cc1627efc12a870fe66
-
SHA256
acf88f80055908ced219ba8c7ada933fda1b6861800e156e64491ab9077842eb
-
SHA512
3de454b3be90c8a91a08d8af929d35ca4994b9c3410134b77ad638204d9a7de384999be7a5d33e2b57910ff247da98a58094738f77be9743ff0e0e07e46a1a27
-
SSDEEP
768:hbOs+EjBO4cl767rI2jUzxoHEQLfp+Zc+wRrl6eUzyjbFCHy5b7I2lSVRR9wggRX:1Os+EDVLf9VRo7gRemy8s
Malware Config
Signatures
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acf88f80055908ced219ba8c7ada933fda1b6861800e156e64491ab9077842eb.exe