Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 12:48
Behavioral task
behavioral1
Sample
8e671eca2079203f119ca8e861e487ef.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8e671eca2079203f119ca8e861e487ef.exe
Resource
win10v2004-20231215-en
General
-
Target
8e671eca2079203f119ca8e861e487ef.exe
-
Size
30KB
-
MD5
8e671eca2079203f119ca8e861e487ef
-
SHA1
5312b7a795bb568e96540099154148d71cfbea8a
-
SHA256
bf064f8c732b0cec2963f2a2fe83c58f512d16043279a3aa3529d0b7a3656dab
-
SHA512
abb3d03d4d696f5d903311f5b14de2a97d6c4f6f764cf8ad8fa83aa6688eb1c3a69ba081b1eb5864c46f84f6e96c53d8e2ee890e3901964c47bcc924887f66d5
-
SSDEEP
768:XocAX3LKew369lp2z3Sd4baFXLjwP/Tgj93b8NIocVSEFm:SKcR4mjD9r823Fm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4676 CTS.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/1092-0-0x0000000000D30000-0x0000000000D47000-memory.dmp upx behavioral2/files/0x000d000000023142-6.dat upx behavioral2/memory/1092-9-0x0000000000D30000-0x0000000000D47000-memory.dmp upx behavioral2/memory/4676-7-0x0000000000B60000-0x0000000000B77000-memory.dmp upx behavioral2/files/0x000300000002276d-12.dat upx behavioral2/files/0x000200000001fafe-30.dat upx behavioral2/memory/4676-32-0x0000000000B60000-0x0000000000B77000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" 8e671eca2079203f119ca8e861e487ef.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" CTS.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CTS.exe 8e671eca2079203f119ca8e861e487ef.exe File created C:\Windows\CTS.exe CTS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1092 8e671eca2079203f119ca8e861e487ef.exe Token: SeDebugPrivilege 4676 CTS.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1092 wrote to memory of 4676 1092 8e671eca2079203f119ca8e861e487ef.exe 88 PID 1092 wrote to memory of 4676 1092 8e671eca2079203f119ca8e861e487ef.exe 88 PID 1092 wrote to memory of 4676 1092 8e671eca2079203f119ca8e861e487ef.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e671eca2079203f119ca8e861e487ef.exe"C:\Users\Admin\AppData\Local\Temp\8e671eca2079203f119ca8e861e487ef.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\CTS.exe"C:\Windows\CTS.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
352KB
MD56f3ada54ad697d40cb3e95a1d72a3ada
SHA10545b2c670432a08342e2e73cdf92c31801a302d
SHA25651b55fdb659a20d35bbc874fe37ce3ea6700274ed35464f961a54201a8d5eaa6
SHA5127f17fdb2083c327571b53f216670dbbb4a6ba17b57da980f6647a5657f4593bd0d91747a0dd0709c2b225d5824ee906d85711591bc97f5ea6b68452359d222aa
-
Filesize
30KB
MD50530689c6b025bd455edf43b6d322c90
SHA1264f2aac1f0d0bdab002530daf2584f13bb92181
SHA2564badef822be9c0abc182761bfa50e1b522fa58a22d31c1899b306937e526a630
SHA5126bad9c7dc52e9c5cd08be58ddf911b043bc28f5e7ccf30b206ef1acacbf28a70ed83108c1afe1e231c326e5567d6b55d54666c9e10e0afd7a3c77d2007a24d93
-
Filesize
29KB
MD570aa23c9229741a9b52e5ce388a883ac
SHA1b42683e21e13de3f71db26635954d992ebe7119e
SHA2569d25cc704b1c00c9d17903e25ca35c319663e997cb9da0b116790b639e9688f2
SHA512be604a2ad5ab8a3e5edb8901016a76042ba873c8d05b4ef8eec31241377ec6b2a883b51c6912dc7640581ffa624547db334683975883ae74e62808b5ae9ab0b5