Analysis

  • max time kernel
    122s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    23/09/2023, 19:07 UTC

General

  • Target

    a2af9ebda6b57e38dceff2cfe34aaecd19f0c4bb5e1b3f91524324d0fd52de80_JC.exe

  • Size

    392KB

  • MD5

    18eda642c0fe68ab57c4899d528af5f6

  • SHA1

    496b288668f7a4e57183ea9c67b0371ba5461d20

  • SHA256

    a2af9ebda6b57e38dceff2cfe34aaecd19f0c4bb5e1b3f91524324d0fd52de80

  • SHA512

    c08ca40b6a3c8034428cb3c5d6fe52921c177417a05a15ee4055da26004b47d38c24f4aba4b1ad2e142de78a9d1a1999d0085544d7a89d107077cf47410ef3d8

  • SSDEEP

    6144:8DoJjYAa3AKbylyCzc61YCyE2vtqb6dXYuP/JjcCTa:2usAaFyoCAdGetqSYOSy

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2af9ebda6b57e38dceff2cfe34aaecd19f0c4bb5e1b3f91524324d0fd52de80_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\a2af9ebda6b57e38dceff2cfe34aaecd19f0c4bb5e1b3f91524324d0fd52de80_JC.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2248

Network

    No results found
  • 31.41.244.27:41140
    a2af9ebda6b57e38dceff2cfe34aaecd19f0c4bb5e1b3f91524324d0fd52de80_JC.exe
    1.7MB
    32.0kB
    1237
    618
No results found

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2248-0-0x0000000000220000-0x000000000025B000-memory.dmp

    Filesize

    236KB

  • memory/2248-1-0x00000000002C0000-0x0000000000310000-memory.dmp

    Filesize

    320KB

  • memory/2248-2-0x0000000000400000-0x0000000000513000-memory.dmp

    Filesize

    1.1MB

  • memory/2248-3-0x0000000002320000-0x0000000002386000-memory.dmp

    Filesize

    408KB

  • memory/2248-4-0x0000000074090000-0x000000007477E000-memory.dmp

    Filesize

    6.9MB

  • memory/2248-5-0x0000000004940000-0x0000000004980000-memory.dmp

    Filesize

    256KB

  • memory/2248-6-0x00000000048B0000-0x0000000004912000-memory.dmp

    Filesize

    392KB

  • memory/2248-7-0x0000000004940000-0x0000000004980000-memory.dmp

    Filesize

    256KB

  • memory/2248-8-0x0000000000220000-0x000000000025B000-memory.dmp

    Filesize

    236KB

  • memory/2248-9-0x00000000002C0000-0x0000000000310000-memory.dmp

    Filesize

    320KB

  • memory/2248-10-0x0000000000400000-0x0000000000513000-memory.dmp

    Filesize

    1.1MB

  • memory/2248-12-0x0000000000400000-0x0000000000513000-memory.dmp

    Filesize

    1.1MB

  • memory/2248-11-0x0000000074090000-0x000000007477E000-memory.dmp

    Filesize

    6.9MB

  • memory/2248-13-0x0000000074090000-0x000000007477E000-memory.dmp

    Filesize

    6.9MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.