Analysis

  • max time kernel
    13s
  • max time network
    17s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/02/2024, 14:02

General

  • Target

    e5c03bee3168aaed6bda717e02db90a4258b70c0143812413e87e4093109ad23.exe

  • Size

    9KB

  • MD5

    fd3c5257cea9840e7707d9fd75091d4d

  • SHA1

    5dfb3cff55cefaf7a018992dec2d1ccc89079ab4

  • SHA256

    e5c03bee3168aaed6bda717e02db90a4258b70c0143812413e87e4093109ad23

  • SHA512

    f81fca983751282bb07c92c7da71bdbed728cfd0abb7cf94d5ad7f83c6f8bc56bdea0f0a44ee6afd3cf6df7cadd53a99966bd641ceb0ca84ec71c83fbf235567

  • SSDEEP

    192:76f0GW5P2Io4evFrDv2ZRJzCn7URRsjVJaZF:76fjWl24evFrT2ZR5Cn7UR0VJo

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 22 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Checks SCSI registry key(s) 3 TTPs 5 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e5c03bee3168aaed6bda717e02db90a4258b70c0143812413e87e4093109ad23.exe
    "C:\Users\Admin\AppData\Local\Temp\e5c03bee3168aaed6bda717e02db90a4258b70c0143812413e87e4093109ad23.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Writes to the Master Boot Record (MBR)
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    PID:4960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Desktop\CopyGroup.dib

    Filesize

    445KB

    MD5

    d62941dcd10ce36d46c7e7e207c5bdb4

    SHA1

    3790c3794e13dea159c06eff45a34adb1d54c040

    SHA256

    bc741d66960a683fd2436bb9a841ac5ccc90feaa27ec94b6d84603875caa6254

    SHA512

    e9148ccb2e1ff83fd5f62db94757884caa9999d3b4848b5747a6fd43f490aa6f872b832aa1838535cfee1f19c297f6618ec7776c461b5cf5188f4adf41ed1f0c