Analysis
-
max time kernel
54s -
max time network
56s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2025, 20:09
Behavioral task
behavioral1
Sample
b16c54e8f2b836264a8f890d162935a37fb0ecfc1dcb12f9a700e7f99e324ffe.exe
Resource
win7-20241010-en
General
-
Target
b16c54e8f2b836264a8f890d162935a37fb0ecfc1dcb12f9a700e7f99e324ffe.exe
-
Size
92KB
-
MD5
bb753230d9026d2da2efb09807a6548c
-
SHA1
739db2a0d1ff6218e80b9f966b7ac0a2503cf5f5
-
SHA256
b16c54e8f2b836264a8f890d162935a37fb0ecfc1dcb12f9a700e7f99e324ffe
-
SHA512
417a5ea1e4ab836720a2c32454d87d1bbd8dd36499d4ffb404bcced59566728debad9d5ef0d35251b69f66868175d20fdfae436ec338a6d128bdc3022e94b008
-
SSDEEP
1536:YhhW0YTGZWdVseJxaM9kraLdV2QkQ1TbPX8IHOCkIsI4ES0RNTh9E+JP19qkPIvL:+hzYTGWVvJ8f2v1TbPzuMsIFSYNThy+u
Malware Config
Signatures
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Program crash 1 IoCs
pid pid_target Process procid_target 6040 5612 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b16c54e8f2b836264a8f890d162935a37fb0ecfc1dcb12f9a700e7f99e324ffe.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5612 b16c54e8f2b836264a8f890d162935a37fb0ecfc1dcb12f9a700e7f99e324ffe.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b16c54e8f2b836264a8f890d162935a37fb0ecfc1dcb12f9a700e7f99e324ffe.exe"C:\Users\Admin\AppData\Local\Temp\b16c54e8f2b836264a8f890d162935a37fb0ecfc1dcb12f9a700e7f99e324ffe.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5612 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5612 -s 6242⤵
- Program crash
PID:6040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5612 -ip 56121⤵PID:6060