Analysis

  • max time kernel
    68s
  • max time network
    65s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    13-07-2020 06:59

General

  • Target

    e06bfb1a6b645d6437051b4ba950a92e.exe

  • Size

    496KB

  • MD5

    e06bfb1a6b645d6437051b4ba950a92e

  • SHA1

    8b18f74b9300dc03df7f826e65d424320cd5cd53

  • SHA256

    fa377574c99698cd65d8897d93e96c287dff271d4838107aeac36e7a843c1053

  • SHA512

    e6a5c00f5ea78a3beb4ab8db9d96d4e61781a72904f0a5340134c5ce413719a12f3802ff259e9e4eb238f4f236fbe27b31d495927ab7949914ac2861a8773ffa

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Checks for installed software on the system 1 TTPs 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e06bfb1a6b645d6437051b4ba950a92e.exe
    "C:\Users\Admin\AppData\Local\Temp\e06bfb1a6b645d6437051b4ba950a92e.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious behavior: EnumeratesProcesses
    • Checks for installed software on the system
    PID:3564

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads