Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-01-2025 00:34
Static task
static1
Behavioral task
behavioral1
Sample
b460655ed0d323b998c27a563d629a4f8c47a243a939d63ffd90e9f663bf1345N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b460655ed0d323b998c27a563d629a4f8c47a243a939d63ffd90e9f663bf1345N.exe
Resource
win10v2004-20241007-en
General
-
Target
b460655ed0d323b998c27a563d629a4f8c47a243a939d63ffd90e9f663bf1345N.exe
-
Size
2.8MB
-
MD5
380c9342a3c2ebf3df4d9ecf44e62cc0
-
SHA1
d79c7734a46675e7140ed9e7d8bd4ac26a54046d
-
SHA256
b460655ed0d323b998c27a563d629a4f8c47a243a939d63ffd90e9f663bf1345
-
SHA512
4e287690a03102b5bcc3f3e6c45c49225a4a1e248451055550af7eb02b33c679ad200ca05bd4e3511b6014a97dee1691080a9926c6a59d83055f6be1c43387bb
-
SSDEEP
49152:3U0lOOUe8FdOIyVX65rcGDnmOOGG+o6MjxfeuDZvf5t:EoLUDnOiQ
Malware Config
Signatures
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b460655ed0d323b998c27a563d629a4f8c47a243a939d63ffd90e9f663bf1345N.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1544 b460655ed0d323b998c27a563d629a4f8c47a243a939d63ffd90e9f663bf1345N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b460655ed0d323b998c27a563d629a4f8c47a243a939d63ffd90e9f663bf1345N.exe"C:\Users\Admin\AppData\Local\Temp\b460655ed0d323b998c27a563d629a4f8c47a243a939d63ffd90e9f663bf1345N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1544