Analysis

  • max time kernel
    132s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2023 03:08

General

  • Target

    01f1977c174c18c0bd9e66e0fe1ff30e.exe

  • Size

    199KB

  • MD5

    01f1977c174c18c0bd9e66e0fe1ff30e

  • SHA1

    d2d07b942255343944c8616fd00cbde4c5d8a205

  • SHA256

    1d00016cfd4814dc843ed7195ea03cfbf619608493f72a8a128713f11debc202

  • SHA512

    819948165b7885140e11af03b55922a6b1f9ca78d44e100d659fadec9eedc456534e9a3b2d488a1ae35376cf31c3aaabff7f90adf07cd458089200734ae9f751

  • SSDEEP

    6144:8ZmwgF+Ylq4Ve8zyAtcYBuz+KSAOha2Twz:+mD+Ylq4Vewtzuz+rUz

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

Processes

  • C:\Users\Admin\AppData\Local\Temp\01f1977c174c18c0bd9e66e0fe1ff30e.exe
    "C:\Users\Admin\AppData\Local\Temp\01f1977c174c18c0bd9e66e0fe1ff30e.exe"
    1⤵
    • Enumerates connected drives
    PID:4932

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads