Analysis

  • max time kernel
    113s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    20-07-2020 10:24

General

  • Target

    bjn1.exe

  • Size

    194KB

  • MD5

    f42360653809d146f0520d3c637eb884

  • SHA1

    0afa923bad4513a9e29bb4062be8fb09745bb96d

  • SHA256

    a3cd4c88cc48bcfd7ad16fd851948010f273215ce0c11b3538defba8f440bd0e

  • SHA512

    b86b296916a799261edfd606cbae71dd021ee084111dfeefe782ee664ed58941c37efacfd46b267fd45bb6f85d2cec877b0e64dcdd429f75e17084cdee27a2ca

Score
7/10

Malware Config

Signatures

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bjn1.exe
    "C:\Users\Admin\AppData\Local\Temp\bjn1.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious behavior: EnumeratesProcesses
    PID:1460

Network

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads