Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2023 19:04

General

  • Target

    368b3822f5dcba598b38b220eecc8787.exe

  • Size

    221KB

  • MD5

    368b3822f5dcba598b38b220eecc8787

  • SHA1

    028bd579edfa963de3ec8c63b2199df13bed6dca

  • SHA256

    8e6e2021f24594178fae898530f54772a4d5a26fa8d30081bb90b48d92f8e5a8

  • SHA512

    696a3a78553552c49d7cb81834cdefa57862079fe187ff463ed25a7d3804cb2ba8ef346098900fd3dcc4e274a1dbd547e8441acbe8c9a333be7c45da72ab8c32

  • SSDEEP

    6144:daxbtfxcUGkAStG1mCazOyD3qK12kibCoM4Q6D:daxbtf/84G1m9Og68CCt4Q6D

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 27 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\368b3822f5dcba598b38b220eecc8787.exe
    "C:\Users\Admin\AppData\Local\Temp\368b3822f5dcba598b38b220eecc8787.exe"
    1⤵
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2528
  • C:\Windows\servicing\TrustedInstaller.exe
    C:\Windows\servicing\TrustedInstaller.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Windows directory
    PID:2368

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\msiexec.vir

    Filesize

    99KB

    MD5

    594cde583f6463eac16df1ee60a77f80

    SHA1

    be14c6685db2d000f27fb0852633f17b6b054e23

    SHA256

    16804326ff8169e445c3c439f0fb17f158ca60423dfddddd9950a219ba967967

    SHA512

    198bfbf1cf7eb8b2fd84b1e71d23a5402a335905a07b19277a4c1c4afbdbb756fa2f56401c4116251f32e0d6ca5a53f0e6bfee8dc1453d5313780a0d93d918c4

  • C:\Windows\servicing\TrustedInstaller.exe

    Filesize

    193KB

    MD5

    805418acd5280e97074bdadca4d95195

    SHA1

    a69e4f03d775a7a0cc5ed2d5569cbfbb4d31d2d6

    SHA256

    73684e31ad4afe3fdc525b51ccaacc14d402c92db9c42e3fcbfe1e65524b1c01

    SHA512

    630a255950c0ae0983ae907d20326adea36ce262c7784428a0811b04726849c929bc9cea338a89e77447a6cec30b0889694158327c002566d3cf5be2bb88e4de

  • memory/2528-0-0x0000000001000000-0x000000000108D000-memory.dmp

    Filesize

    564KB

  • memory/2528-1-0x0000000001000000-0x000000000108D000-memory.dmp

    Filesize

    564KB

  • memory/2528-43-0x0000000001000000-0x000000000108D000-memory.dmp

    Filesize

    564KB