Analysis
-
max time kernel
157s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 03:56
Static task
static1
Behavioral task
behavioral1
Sample
3b362c65516bb53f71e8a3b6e95501ea_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
3b362c65516bb53f71e8a3b6e95501ea_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
3b362c65516bb53f71e8a3b6e95501ea_JC.exe
-
Size
640KB
-
MD5
3b362c65516bb53f71e8a3b6e95501ea
-
SHA1
88d0da8e34a12213d66c1d523ca21bbf6583fcfd
-
SHA256
e3d5979c6ad5cbef4edcf6281ccfcc06355077b966a35ed85f598cc070ed62ff
-
SHA512
d2d2ab755da3f39b5ab1dae3585db4131112b694827a62c520bd4109b36ac2caed6715a39113903d874390118934f1ac7459bdcefaa8b67ef816895ce7ab4ce2
-
SSDEEP
12288:hS0Xu2xJFSxJU5Bt+IVEXyJoIhCiznxVxwX8FOn8CReQ2C00UhQMeIOF5eeo+gC0:DXu2ucB88EiJLvzx7wX8FOnvko0RQbDq
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 116 PHDSSw2h9vHxtzW.exe 4844 CTS.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" 3b362c65516bb53f71e8a3b6e95501ea_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" CTS.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CTS.exe 3b362c65516bb53f71e8a3b6e95501ea_JC.exe File created C:\Windows\CTS.exe CTS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5044 3b362c65516bb53f71e8a3b6e95501ea_JC.exe Token: SeDebugPrivilege 4844 CTS.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 5044 wrote to memory of 116 5044 3b362c65516bb53f71e8a3b6e95501ea_JC.exe 85 PID 5044 wrote to memory of 116 5044 3b362c65516bb53f71e8a3b6e95501ea_JC.exe 85 PID 5044 wrote to memory of 4844 5044 3b362c65516bb53f71e8a3b6e95501ea_JC.exe 86 PID 5044 wrote to memory of 4844 5044 3b362c65516bb53f71e8a3b6e95501ea_JC.exe 86 PID 5044 wrote to memory of 4844 5044 3b362c65516bb53f71e8a3b6e95501ea_JC.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b362c65516bb53f71e8a3b6e95501ea_JC.exe"C:\Users\Admin\AppData\Local\Temp\3b362c65516bb53f71e8a3b6e95501ea_JC.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\PHDSSw2h9vHxtzW.exeC:\Users\Admin\AppData\Local\Temp\PHDSSw2h9vHxtzW.exe2⤵
- Executes dropped EXE
PID:116
-
-
C:\Windows\CTS.exe"C:\Windows\CTS.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
393KB
MD5d6c4af88e571493e9ad50e5f33852703
SHA1c78a18b87de998a57a670604ed6478a0fc289fa1
SHA25646b3c06fdcb019d11be71d3b1b7d98435c7ffaea1be2b7bfede5fa30dae202b8
SHA5123cc778f92b181df902a24aaeb7d064f8e291fcdd45451b32cebeac37ef78d1125d65ab5a5608fc6155ba3ce263434eb0a661a5948ae904cd85d44776fa972a06
-
Filesize
640KB
MD5c75e9445b15c5ed8ae956aa2f0d19a99
SHA1adefe1ff10bcbedc03e594516feda2a5c4b960af
SHA25624a06a63b46a40a8c0d62975f50e80060264ab9e6978ef6b1ba17d64a767be4a
SHA5126c62b4fe220a1826d6178d1399f610a6c91ad5a3f91ab3dabb35be8e3d866bdd03cd8d3d7c212d629b1203acd151ec9e795dacc71c28d90b01bbeb6003ef441e
-
Filesize
569KB
MD50157a4087d8d0d3f133b53a039fcce22
SHA134121828bcdd4188bf4987d44fe513c7e169f708
SHA25619b09da9db826173a8de150f6ee1a9da4217f642479b1e9c2f07ed3aff1eb37e
SHA51212706221d50db53acf70445e56f05da1262ee819a55df1bd8bd5d42a18ef9553f6b3a14f62f9e00b70239a421db0d6879a684dd9c5e1e723f69dd4e5bbdc7455
-
Filesize
71KB
MD566df4ffab62e674af2e75b163563fc0b
SHA1dec8a197312e41eeb3cfef01cb2a443f0205cd6e
SHA256075a6eecd8da1795532318f9cf880efe42461f9464d63f74deb271d33110f163
SHA5121588dd78e6e8972013c40cdb6acfb84c8df7b081197233ce621904b645356c805d0424bb93dd46c55834dc47d9ff39ee1323cf8e670841b3fff24ab98ba87f25
-
Filesize
71KB
MD566df4ffab62e674af2e75b163563fc0b
SHA1dec8a197312e41eeb3cfef01cb2a443f0205cd6e
SHA256075a6eecd8da1795532318f9cf880efe42461f9464d63f74deb271d33110f163
SHA5121588dd78e6e8972013c40cdb6acfb84c8df7b081197233ce621904b645356c805d0424bb93dd46c55834dc47d9ff39ee1323cf8e670841b3fff24ab98ba87f25