Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    13-03-2024 23:10

General

  • Target

    c862aacbdacc86d670686e2086442c59cfbbf527349e30d0dad1860098b0f4e0.exe

  • Size

    34.5MB

  • MD5

    7c9103da2f95244a5cdcb79991e116eb

  • SHA1

    deedb6ebfbd266143de06aabd703d19fc526b5ac

  • SHA256

    c862aacbdacc86d670686e2086442c59cfbbf527349e30d0dad1860098b0f4e0

  • SHA512

    10639b6f2a0d66a606adf6ad5233c0d75dfe9b27432d22b8544b4a6a0174ffd5c0ce7b6a43d9e74ecf2dc696ca8751bfa1d3e6d9f9ef6a215e0364f6fb2dbc41

  • SSDEEP

    393216:r3NJBg1Um/LMtezjGzXzq2cO6XrXKi0kweZJsv6tWKFdu9CvDN9kRSggLVHJh6Qb:jRXtPzsXKlk3Vj5CQchRu

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c862aacbdacc86d670686e2086442c59cfbbf527349e30d0dad1860098b0f4e0.exe
    "C:\Users\Admin\AppData\Local\Temp\c862aacbdacc86d670686e2086442c59cfbbf527349e30d0dad1860098b0f4e0.exe"
    1⤵
    • Enumerates connected drives
    • Writes to the Master Boot Record (MBR)
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    PID:1876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RogueKiller\Debug\RogueKiller Anti-Malware_debug.log

    Filesize

    6KB

    MD5

    29571ba7c35d33e53a3b6c8370302ace

    SHA1

    aa868282b3c6d8e3acce37ab704d9dfa7b067e32

    SHA256

    d7e3934cb136a48d1acb58861322b1197f8b879212a9421a6ada75ea77cf36d0

    SHA512

    59de3eaae93eedda4c031d88636f63f0e77eb3d6931cfe9faba6e94620e75a65c6b79b5d82ff50b45235bf70273585fd6c28ae309be93c69dfa7765a97cf674c

  • C:\Users\Admin\AppData\Local\Temp\RogueKiller\config.ini

    Filesize

    4KB

    MD5

    9e7d244660cfb20602531a800bc9cbcf

    SHA1

    338bd8355e57cfaca56898d63ad3d45ac0ffc8e8

    SHA256

    914fd570cddfa90367aa93a55075c01ea3e45b8dec17cb363eaa40d22caffb5b

    SHA512

    0095d60909b2914cd98b77a9bd6fcf07df97511b9da017b8e0d1a2b3afdbb3414e85cdca20603ad1a0f1d130436f1422a7639093e58ca1da2acc9498f2a86a29

  • memory/1876-0-0x0000000000420000-0x000000000042A000-memory.dmp

    Filesize

    40KB

  • memory/1876-1-0x0000000000420000-0x000000000042A000-memory.dmp

    Filesize

    40KB

  • memory/1876-35-0x0000000000420000-0x000000000042A000-memory.dmp

    Filesize

    40KB

  • memory/1876-36-0x0000000000420000-0x000000000042A000-memory.dmp

    Filesize

    40KB