Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    01-07-2024 04:37

General

  • Target

    6f240ddeca65d27311b0d3f30507bd9f4406a503fe821ef4e2e77704e20d6d7d.exe

  • Size

    9.0MB

  • MD5

    5b6c1c97499114d776600baf3d0103bd

  • SHA1

    bf08f8c77359ce82b4cce0d74b1a8616d6b54d25

  • SHA256

    6f240ddeca65d27311b0d3f30507bd9f4406a503fe821ef4e2e77704e20d6d7d

  • SHA512

    01919611470290654b2fcc186466f93fa971677ae718ad88ec631d8ea4267f39fc1cbadd9ca5d71d6541994038e57f47ee5db48ddbbc032a2ad97a42a77af796

  • SSDEEP

    196608:nrJcDKlFBqyzwDxURK8vyqByLdlf3hRQIgLKN:rODKlFBqywayOclfhRQIG2

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f240ddeca65d27311b0d3f30507bd9f4406a503fe821ef4e2e77704e20d6d7d.exe
    "C:\Users\Admin\AppData\Local\Temp\6f240ddeca65d27311b0d3f30507bd9f4406a503fe821ef4e2e77704e20d6d7d.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1644

Network

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads