General
-
Target
jitbit-macro-recorder-5.9.0-installer_1L-2oJ1.exe
-
Size
1.7MB
-
Sample
240918-rsjecawarc
-
MD5
76974b990f52405522b0f38f43b9e973
-
SHA1
2e4c67a8772b5bf86b563602b252e3957da7d923
-
SHA256
90846154abe13934aded2cdeb432394148240531ebd58abf5197ae0be73e854d
-
SHA512
74604af64a9bd99e632ecc97c1be8a951fe35d66ada60be57cd5c431578537044a62614817e7361948a0f5ba5a6b689b721b83eea1712c66347faaedcb4fe06d
-
SSDEEP
24576:S7FUDowAyrTVE3U5F/sLuHhCLogeQo40gBxnBJ4sxtMXBCYk:SBuZrEUfRFXgznBJZ1
Static task
static1
Behavioral task
behavioral1
Sample
jitbit-macro-recorder-5.9.0-installer_1L-2oJ1.exe
Resource
win10-20240404-en
Malware Config
Targets
-
-
Target
jitbit-macro-recorder-5.9.0-installer_1L-2oJ1.exe
-
Size
1.7MB
-
MD5
76974b990f52405522b0f38f43b9e973
-
SHA1
2e4c67a8772b5bf86b563602b252e3957da7d923
-
SHA256
90846154abe13934aded2cdeb432394148240531ebd58abf5197ae0be73e854d
-
SHA512
74604af64a9bd99e632ecc97c1be8a951fe35d66ada60be57cd5c431578537044a62614817e7361948a0f5ba5a6b689b721b83eea1712c66347faaedcb4fe06d
-
SSDEEP
24576:S7FUDowAyrTVE3U5F/sLuHhCLogeQo40gBxnBJ4sxtMXBCYk:SBuZrEUfRFXgznBJZ1
-
Cobalt Strike reflective loader
Detects the reflective loader used by Cobalt Strike.
-
Contains code to disable Windows Defender
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Drops file in Drivers directory
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Adds Run key to start application
-
Downloads MZ/PE file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Modifies powershell logging option
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1