Analysis
-
max time kernel
146s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 04:40
Behavioral task
behavioral1
Sample
089071cb470daf205e4006e280aed6ea9e81105c4b350a8abdc2d86e543b4dc3.exe
Resource
win7-20240508-en
2 signatures
150 seconds
General
-
Target
089071cb470daf205e4006e280aed6ea9e81105c4b350a8abdc2d86e543b4dc3.exe
-
Size
9.0MB
-
MD5
09e6ae2eb205863d24b3bbf78b899499
-
SHA1
721467de92529acb1721e12a6a53ebb599a79a57
-
SHA256
089071cb470daf205e4006e280aed6ea9e81105c4b350a8abdc2d86e543b4dc3
-
SHA512
57813bf9992a91ca00b37e6e1c0d1087b3b6e22af5767e81b98bbe855fb7a84a94825b80deef37415feeb63b81636a0e580bd701983c04cbcd1a389fdee4ae59
-
SSDEEP
196608:nMJcDKlFBqZcPzFwDxURK8vyqByLdlf3hRQIgLKN:MODKlFBqauayOclfhRQIG2
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
089071cb470daf205e4006e280aed6ea9e81105c4b350a8abdc2d86e543b4dc3.exepid process 1524 089071cb470daf205e4006e280aed6ea9e81105c4b350a8abdc2d86e543b4dc3.exe 1524 089071cb470daf205e4006e280aed6ea9e81105c4b350a8abdc2d86e543b4dc3.exe