Analysis

  • max time kernel
    143s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 21:39

General

  • Target

    965e4762099774891dae2545246cc445_JC.exe

  • Size

    76KB

  • MD5

    965e4762099774891dae2545246cc445

  • SHA1

    b589a5c62a773acaf07285b6ed566d181bc2dbd4

  • SHA256

    07246af39caa4b793b01891460ddd554bac8cda2a2ecebd35e56e12459848afe

  • SHA512

    410ee4bd5a421fd5ae3191e5201907eead49580af8d50c61cd85a15f67c0b316ac832bc85507d3f96feebaf2cc3a34e8bde2edce85e5d68566a08fc3e1b2c7c1

  • SSDEEP

    1536:Fc897UsWjcd9w+AyabjDbxE+MwmvlDuazTAtrq:ZhpAyazIlyazTAtrq

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\965e4762099774891dae2545246cc445_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\965e4762099774891dae2545246cc445_JC.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2876
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:3416

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

    Filesize

    393KB

    MD5

    3bba3cd716d1320b891cbab03b7ba559

    SHA1

    f1f7484dce55254ff946780de4e4d23ebdc5bd60

    SHA256

    dcd58867f38b38462374ff06ed677af01b3f0bbe33d693572bca2d3a94544cad

    SHA512

    5cace071579344909798eb4ff4015e520324040a6d2f41b17ac5db5e4837a84a1a5a343e395d86b9d8cc5c5edc78de16a9e740ae32be9cc1a6007b89bbad53d0

  • C:\Users\Admin\AppData\Local\Temp\JFhtEHkF001xUsM.exe

    Filesize

    76KB

    MD5

    f5dec62e3311e138011a983fc59f1e39

    SHA1

    ac7fa70f8cdb086bf5dc29587128fa1b659bf077

    SHA256

    d8b4278a5eb2ede170cd62e3a2e4cd446bb2639500c134d258f705eb39bd4635

    SHA512

    f49a24b2ad5d91d828891ab407ca54a1cd080a91ca93b1c57d40a4d5d1a52d21d4cfa805052f1ea899fc4cd4d7f09db20f5096bfe64433ee2c36fcbef2913d00

  • C:\Windows\CTS.exe

    Filesize

    71KB

    MD5

    66df4ffab62e674af2e75b163563fc0b

    SHA1

    dec8a197312e41eeb3cfef01cb2a443f0205cd6e

    SHA256

    075a6eecd8da1795532318f9cf880efe42461f9464d63f74deb271d33110f163

    SHA512

    1588dd78e6e8972013c40cdb6acfb84c8df7b081197233ce621904b645356c805d0424bb93dd46c55834dc47d9ff39ee1323cf8e670841b3fff24ab98ba87f25

  • C:\Windows\CTS.exe

    Filesize

    71KB

    MD5

    66df4ffab62e674af2e75b163563fc0b

    SHA1

    dec8a197312e41eeb3cfef01cb2a443f0205cd6e

    SHA256

    075a6eecd8da1795532318f9cf880efe42461f9464d63f74deb271d33110f163

    SHA512

    1588dd78e6e8972013c40cdb6acfb84c8df7b081197233ce621904b645356c805d0424bb93dd46c55834dc47d9ff39ee1323cf8e670841b3fff24ab98ba87f25