Analysis

  • max time kernel
    54s
  • max time network
    56s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/03/2025, 20:09

General

  • Target

    b16c54e8f2b836264a8f890d162935a37fb0ecfc1dcb12f9a700e7f99e324ffe.exe

  • Size

    92KB

  • MD5

    bb753230d9026d2da2efb09807a6548c

  • SHA1

    739db2a0d1ff6218e80b9f966b7ac0a2503cf5f5

  • SHA256

    b16c54e8f2b836264a8f890d162935a37fb0ecfc1dcb12f9a700e7f99e324ffe

  • SHA512

    417a5ea1e4ab836720a2c32454d87d1bbd8dd36499d4ffb404bcced59566728debad9d5ef0d35251b69f66868175d20fdfae436ec338a6d128bdc3022e94b008

  • SSDEEP

    1536:YhhW0YTGZWdVseJxaM9kraLdV2QkQ1TbPX8IHOCkIsI4ES0RNTh9E+JP19qkPIvL:+hzYTGWVvJ8f2v1TbPzuMsIFSYNThy+u

Malware Config

Signatures

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b16c54e8f2b836264a8f890d162935a37fb0ecfc1dcb12f9a700e7f99e324ffe.exe
    "C:\Users\Admin\AppData\Local\Temp\b16c54e8f2b836264a8f890d162935a37fb0ecfc1dcb12f9a700e7f99e324ffe.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:5612
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 5612 -s 624
      2⤵
      • Program crash
      PID:6040
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5612 -ip 5612
    1⤵
      PID:6060

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads