Analysis
-
max time kernel
102s -
max time network
103s -
platform
windows11-21h2_x64 -
resource
win11-20250410-en -
resource tags
arch:x64arch:x86image:win11-20250410-enlocale:en-usos:windows11-21h2-x64system -
submitted
15/04/2025, 19:52
Behavioral task
behavioral1
Sample
file.exe
Resource
win10v2004-20250314-en
2 signatures
150 seconds
General
-
Target
file.exe
-
Size
20KB
-
MD5
ad89dd0ccbc6cfdea9c01d3ed1e37222
-
SHA1
032e14839589a0e72414dffb1c11f29710a120db
-
SHA256
764b5037aa551fc0a9feb30b213e04605cba3babc5ec301d9cd4a50e88311618
-
SHA512
848d64ffcae8fc4136ba82b61d08d4c15ea693ee8e9360b1236c73cd8086631474f4ff5211977869228bfee35fea64b97fecf9145586149dee4e952c84d69629
-
SSDEEP
384:wc0WLc01PcOA/UkeG/ibYTJ4JVB0TjztSSR:B5PcOUUHYAIf
Malware Config
Signatures
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe