Analysis

  • max time kernel
    157s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/03/2024, 23:10

General

  • Target

    c862aacbdacc86d670686e2086442c59cfbbf527349e30d0dad1860098b0f4e0.exe

  • Size

    34.5MB

  • MD5

    7c9103da2f95244a5cdcb79991e116eb

  • SHA1

    deedb6ebfbd266143de06aabd703d19fc526b5ac

  • SHA256

    c862aacbdacc86d670686e2086442c59cfbbf527349e30d0dad1860098b0f4e0

  • SHA512

    10639b6f2a0d66a606adf6ad5233c0d75dfe9b27432d22b8544b4a6a0174ffd5c0ce7b6a43d9e74ecf2dc696ca8751bfa1d3e6d9f9ef6a215e0364f6fb2dbc41

  • SSDEEP

    393216:r3NJBg1Um/LMtezjGzXzq2cO6XrXKi0kweZJsv6tWKFdu9CvDN9kRSggLVHJh6Qb:jRXtPzsXKlk3Vj5CQchRu

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 25 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\c862aacbdacc86d670686e2086442c59cfbbf527349e30d0dad1860098b0f4e0.exe
    "C:\Users\Admin\AppData\Local\Temp\c862aacbdacc86d670686e2086442c59cfbbf527349e30d0dad1860098b0f4e0.exe"
    1⤵
    • Enumerates connected drives
    • Writes to the Master Boot Record (MBR)
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    PID:3432
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3980 --field-trial-handle=3084,i,14217130992253490921,11543335378077656547,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:1348

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\RogueKiller\config.ini

            Filesize

            4KB

            MD5

            11b4db8374533cd68f9e354e45a7631a

            SHA1

            468b150b9ad94cf6237dbf4848841abc24559938

            SHA256

            7cebf03f4c7d711617c46e022b009a3939acee16953217e7a524149355142571

            SHA512

            119ed1f214dc452d292b38cd6f3d953bf2d5a31da3ef376dc0e8691e263d38de2f3cc0612f17fa3b14fe12b88ee8729fce4a564c4071d34744876bb690da1966