Analysis

  • max time kernel
    141s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2023, 00:36

General

  • Target

    6f1aff257d43624aa0527ad8e42a9eaa_JC.exe

  • Size

    476KB

  • MD5

    6f1aff257d43624aa0527ad8e42a9eaa

  • SHA1

    05b88598b95381e953ded29f283a74c09804c24a

  • SHA256

    f197085e02a2ee9e70b421847c1aa685acd571fd677a91cb3024f63228e27e68

  • SHA512

    cd2dcac8c0ccd68ffc616d26250844c724d993e82fdbed7b8ac00982a6b6cbdfc2a3ab83f50c5103992a3e92c7f8aa13b6f458db01c7d497d4d7f4cbffbbafb9

  • SSDEEP

    12288:ZteeYSnaQVt3Iu89PJ7a3KfMcVVDAmUlJdq6ozktbsJ0C:ZteeY69T3UJ7Vf7eFtNozkRsJT

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f1aff257d43624aa0527ad8e42a9eaa_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\6f1aff257d43624aa0527ad8e42a9eaa_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1460
    • C:\Users\Admin\AppData\Local\Temp\0We9oeg8sS2hrrQ.exe
      C:\Users\Admin\AppData\Local\Temp\0We9oeg8sS2hrrQ.exe
      2⤵
      • Executes dropped EXE
      PID:1288
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:3000

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\0We9oeg8sS2hrrQ.exe

          Filesize

          476KB

          MD5

          935e2ac5b9c3efb1167242716b096422

          SHA1

          c13d37c636b97a59eade8178501d765cb30819a7

          SHA256

          d88d411538fe8f8f7701303b94caddd146af664b839263718576e7bd0cdf0611

          SHA512

          33f543d356e2e6d5d328d602d6da304e16b6646e42226d0ae7f73d48e46b1a5d34b483539f5ec8a0dc9bc589c9f77c9b1f645b6e43a2ebecc8a2a89926c3d7ed

        • C:\Users\Admin\AppData\Local\Temp\0We9oeg8sS2hrrQ.exe

          Filesize

          64KB

          MD5

          e97c622b03fb2a2598bf019fbbe29f2c

          SHA1

          32698bd1d3a0ff6cf441770d1b2b816285068d19

          SHA256

          5c1af46c7300e87a73dacf6cf41ce397e3f05df6bd9c7e227b4ac59f85769160

          SHA512

          db70c62fb35a8e5b005f13b57c1ebbf6c465f6ff0524422294c43e27fb4aa79379dc1e300ad11dc2354405c43b192ae06b91c0f525a1f2617e4d14673651a87d

        • C:\Users\Admin\AppData\Local\Temp\0We9oeg8sS2hrrQ.exe

          Filesize

          64KB

          MD5

          e97c622b03fb2a2598bf019fbbe29f2c

          SHA1

          32698bd1d3a0ff6cf441770d1b2b816285068d19

          SHA256

          5c1af46c7300e87a73dacf6cf41ce397e3f05df6bd9c7e227b4ac59f85769160

          SHA512

          db70c62fb35a8e5b005f13b57c1ebbf6c465f6ff0524422294c43e27fb4aa79379dc1e300ad11dc2354405c43b192ae06b91c0f525a1f2617e4d14673651a87d

        • C:\Windows\CTS.exe

          Filesize

          412KB

          MD5

          5c0283165000c05ddbb2d74fb6084223

          SHA1

          2e725d4ccf1d23cf4b18e80ef962ea342d4e7f7d

          SHA256

          55adcf4b195ca87cc5f45ec0f6c1d1068a5d9163ed05c50ab58799503dc877b4

          SHA512

          dcbd4ffc5306df6afbdecc509759e6ad1a7ec4dd48917637520cb3844984c526246f7ed005849f046e03f722bbf11e3966328c9287a4061db6eba9b1881b7ca5

        • C:\Windows\CTS.exe

          Filesize

          412KB

          MD5

          5c0283165000c05ddbb2d74fb6084223

          SHA1

          2e725d4ccf1d23cf4b18e80ef962ea342d4e7f7d

          SHA256

          55adcf4b195ca87cc5f45ec0f6c1d1068a5d9163ed05c50ab58799503dc877b4

          SHA512

          dcbd4ffc5306df6afbdecc509759e6ad1a7ec4dd48917637520cb3844984c526246f7ed005849f046e03f722bbf11e3966328c9287a4061db6eba9b1881b7ca5

        • C:\Windows\CTS.exe

          Filesize

          412KB

          MD5

          5c0283165000c05ddbb2d74fb6084223

          SHA1

          2e725d4ccf1d23cf4b18e80ef962ea342d4e7f7d

          SHA256

          55adcf4b195ca87cc5f45ec0f6c1d1068a5d9163ed05c50ab58799503dc877b4

          SHA512

          dcbd4ffc5306df6afbdecc509759e6ad1a7ec4dd48917637520cb3844984c526246f7ed005849f046e03f722bbf11e3966328c9287a4061db6eba9b1881b7ca5

        • \Users\Admin\AppData\Local\Temp\0We9oeg8sS2hrrQ.exe

          Filesize

          64KB

          MD5

          e97c622b03fb2a2598bf019fbbe29f2c

          SHA1

          32698bd1d3a0ff6cf441770d1b2b816285068d19

          SHA256

          5c1af46c7300e87a73dacf6cf41ce397e3f05df6bd9c7e227b4ac59f85769160

          SHA512

          db70c62fb35a8e5b005f13b57c1ebbf6c465f6ff0524422294c43e27fb4aa79379dc1e300ad11dc2354405c43b192ae06b91c0f525a1f2617e4d14673651a87d

        • \Users\Admin\AppData\Local\Temp\0We9oeg8sS2hrrQ.exe

          Filesize

          64KB

          MD5

          e97c622b03fb2a2598bf019fbbe29f2c

          SHA1

          32698bd1d3a0ff6cf441770d1b2b816285068d19

          SHA256

          5c1af46c7300e87a73dacf6cf41ce397e3f05df6bd9c7e227b4ac59f85769160

          SHA512

          db70c62fb35a8e5b005f13b57c1ebbf6c465f6ff0524422294c43e27fb4aa79379dc1e300ad11dc2354405c43b192ae06b91c0f525a1f2617e4d14673651a87d

        • memory/1460-0-0x00000000003E0000-0x0000000000400000-memory.dmp

          Filesize

          128KB

        • memory/1460-15-0x00000000003E0000-0x0000000000400000-memory.dmp

          Filesize

          128KB

        • memory/1460-11-0x0000000000070000-0x0000000000090000-memory.dmp

          Filesize

          128KB

        • memory/3000-18-0x00000000010C0000-0x00000000010E0000-memory.dmp

          Filesize

          128KB