Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
31/10/2023, 23:21
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.6eb2357ec8b2fc41a011ac7b6ce31cc0_JC.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.6eb2357ec8b2fc41a011ac7b6ce31cc0_JC.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.6eb2357ec8b2fc41a011ac7b6ce31cc0_JC.exe
-
Size
131KB
-
MD5
6eb2357ec8b2fc41a011ac7b6ce31cc0
-
SHA1
f585bbd17842680afb895a68c9b0708f60738aa9
-
SHA256
88d3ef5e511ff266f861a9321d145353ed6a7bf253bfb41c11776f7d38174eb5
-
SHA512
71aacf87a63193ffe2a1a737a883801f6530567baad7dbf7efd65871f029de302f2d5b7f629c9a7f4babffb0edacbce335a84f846e87844cdb9dd5b2ac05734f
-
SSDEEP
3072:ZRpAyazIlyazTkyO4tcM0hfiWepJ//bw7:xZMaz8g70qpJ/zq
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2004 0B6fwBkVpcQeW1h.exe 2256 CTS.exe -
Loads dropped DLL 2 IoCs
pid Process 2536 NEAS.6eb2357ec8b2fc41a011ac7b6ce31cc0_JC.exe 2536 NEAS.6eb2357ec8b2fc41a011ac7b6ce31cc0_JC.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" NEAS.6eb2357ec8b2fc41a011ac7b6ce31cc0_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" CTS.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CTS.exe CTS.exe File created C:\Windows\CTS.exe NEAS.6eb2357ec8b2fc41a011ac7b6ce31cc0_JC.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2536 NEAS.6eb2357ec8b2fc41a011ac7b6ce31cc0_JC.exe Token: SeDebugPrivilege 2256 CTS.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2004 2536 NEAS.6eb2357ec8b2fc41a011ac7b6ce31cc0_JC.exe 28 PID 2536 wrote to memory of 2004 2536 NEAS.6eb2357ec8b2fc41a011ac7b6ce31cc0_JC.exe 28 PID 2536 wrote to memory of 2004 2536 NEAS.6eb2357ec8b2fc41a011ac7b6ce31cc0_JC.exe 28 PID 2536 wrote to memory of 2004 2536 NEAS.6eb2357ec8b2fc41a011ac7b6ce31cc0_JC.exe 28 PID 2536 wrote to memory of 2256 2536 NEAS.6eb2357ec8b2fc41a011ac7b6ce31cc0_JC.exe 29 PID 2536 wrote to memory of 2256 2536 NEAS.6eb2357ec8b2fc41a011ac7b6ce31cc0_JC.exe 29 PID 2536 wrote to memory of 2256 2536 NEAS.6eb2357ec8b2fc41a011ac7b6ce31cc0_JC.exe 29 PID 2536 wrote to memory of 2256 2536 NEAS.6eb2357ec8b2fc41a011ac7b6ce31cc0_JC.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.6eb2357ec8b2fc41a011ac7b6ce31cc0_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.6eb2357ec8b2fc41a011ac7b6ce31cc0_JC.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\0B6fwBkVpcQeW1h.exeC:\Users\Admin\AppData\Local\Temp\0B6fwBkVpcQeW1h.exe2⤵
- Executes dropped EXE
PID:2004
-
-
C:\Windows\CTS.exe"C:\Windows\CTS.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD57b112b1fb864c90ec5b65eab21cb40b8
SHA1e7b73361f722fc7cbb93ef98a8d26e34f4d49767
SHA256751941b4e09898c31791efeb5f90fc7367c89831d4a98637ed505e40763e287b
SHA512bf9cdeff39cc4fa48457c55ad02e3856b5b27998535aed801a469252f01e7676462332fa3f93877753e963d037472f615c1fc5fc2e996316621b4e0a180cb5f5
-
Filesize
60KB
MD57b112b1fb864c90ec5b65eab21cb40b8
SHA1e7b73361f722fc7cbb93ef98a8d26e34f4d49767
SHA256751941b4e09898c31791efeb5f90fc7367c89831d4a98637ed505e40763e287b
SHA512bf9cdeff39cc4fa48457c55ad02e3856b5b27998535aed801a469252f01e7676462332fa3f93877753e963d037472f615c1fc5fc2e996316621b4e0a180cb5f5
-
Filesize
60KB
MD57b112b1fb864c90ec5b65eab21cb40b8
SHA1e7b73361f722fc7cbb93ef98a8d26e34f4d49767
SHA256751941b4e09898c31791efeb5f90fc7367c89831d4a98637ed505e40763e287b
SHA512bf9cdeff39cc4fa48457c55ad02e3856b5b27998535aed801a469252f01e7676462332fa3f93877753e963d037472f615c1fc5fc2e996316621b4e0a180cb5f5
-
Filesize
71KB
MD5f60519a4b9abe303feb4b5b3666a551e
SHA1d5bb38474958a5f51fb74886482fa44e873898f5
SHA2566be608cffb5de883843e26f17b767ebf3e0a7fe41137460b32490bcec58e382d
SHA5123f5f479628de5e4c7911e3730062ac672f721cc513218f38193bfc9426f7fa988b97c9d315689f1b90f15805760b1b284fe4e5ef65fdf482014942f07b1e1bd7
-
Filesize
71KB
MD5f60519a4b9abe303feb4b5b3666a551e
SHA1d5bb38474958a5f51fb74886482fa44e873898f5
SHA2566be608cffb5de883843e26f17b767ebf3e0a7fe41137460b32490bcec58e382d
SHA5123f5f479628de5e4c7911e3730062ac672f721cc513218f38193bfc9426f7fa988b97c9d315689f1b90f15805760b1b284fe4e5ef65fdf482014942f07b1e1bd7
-
Filesize
71KB
MD5f60519a4b9abe303feb4b5b3666a551e
SHA1d5bb38474958a5f51fb74886482fa44e873898f5
SHA2566be608cffb5de883843e26f17b767ebf3e0a7fe41137460b32490bcec58e382d
SHA5123f5f479628de5e4c7911e3730062ac672f721cc513218f38193bfc9426f7fa988b97c9d315689f1b90f15805760b1b284fe4e5ef65fdf482014942f07b1e1bd7
-
Filesize
60KB
MD57b112b1fb864c90ec5b65eab21cb40b8
SHA1e7b73361f722fc7cbb93ef98a8d26e34f4d49767
SHA256751941b4e09898c31791efeb5f90fc7367c89831d4a98637ed505e40763e287b
SHA512bf9cdeff39cc4fa48457c55ad02e3856b5b27998535aed801a469252f01e7676462332fa3f93877753e963d037472f615c1fc5fc2e996316621b4e0a180cb5f5
-
Filesize
60KB
MD57b112b1fb864c90ec5b65eab21cb40b8
SHA1e7b73361f722fc7cbb93ef98a8d26e34f4d49767
SHA256751941b4e09898c31791efeb5f90fc7367c89831d4a98637ed505e40763e287b
SHA512bf9cdeff39cc4fa48457c55ad02e3856b5b27998535aed801a469252f01e7676462332fa3f93877753e963d037472f615c1fc5fc2e996316621b4e0a180cb5f5