Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 12:57
Behavioral task
behavioral1
Sample
937cec6ba28d84bab591c410379e993a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
937cec6ba28d84bab591c410379e993a.exe
Resource
win10v2004-20231215-en
General
-
Target
937cec6ba28d84bab591c410379e993a.exe
-
Size
36KB
-
MD5
937cec6ba28d84bab591c410379e993a
-
SHA1
b021453c6667b9b02326112852d2afe84952cbb7
-
SHA256
08e5bc6344f4e5876cb829aac4c431c062fb50e3ffd439e116738e8f11db6474
-
SHA512
66f77c4ab0e65daedc64b0a179bc0cee005706f65192bfb9eb164442c396c07b679414a2746a94a3ffdf4639f1c9038ee345ad75ddc13d209d4c59d1ae28bced
-
SSDEEP
768:X8Q2ZDX3LKew369lp2z3Sd4baFXLjwP/Tgj93b8NIom46+It:s9Z3KcR4mjD9r8226+o
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1616 CTS.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/2356-0-0x00000000009B0000-0x00000000009C7000-memory.dmp upx behavioral2/files/0x000900000002321f-6.dat upx behavioral2/memory/1616-8-0x00000000008F0000-0x0000000000907000-memory.dmp upx behavioral2/memory/2356-7-0x00000000009B0000-0x00000000009C7000-memory.dmp upx behavioral2/files/0x0003000000022764-12.dat upx behavioral2/files/0x000300000001f45f-30.dat upx behavioral2/memory/1616-33-0x00000000008F0000-0x0000000000907000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" 937cec6ba28d84bab591c410379e993a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" CTS.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CTS.exe 937cec6ba28d84bab591c410379e993a.exe File created C:\Windows\CTS.exe CTS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2356 937cec6ba28d84bab591c410379e993a.exe Token: SeDebugPrivilege 1616 CTS.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2356 wrote to memory of 1616 2356 937cec6ba28d84bab591c410379e993a.exe 90 PID 2356 wrote to memory of 1616 2356 937cec6ba28d84bab591c410379e993a.exe 90 PID 2356 wrote to memory of 1616 2356 937cec6ba28d84bab591c410379e993a.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\937cec6ba28d84bab591c410379e993a.exe"C:\Users\Admin\AppData\Local\Temp\937cec6ba28d84bab591c410379e993a.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\CTS.exe"C:\Windows\CTS.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
359KB
MD5f9273f26b99df8201e72b31c25e0d08e
SHA10c9331dd2210158d032db6d1015f1c14e0c5f7cf
SHA256a889d1c19eff4e06802ba412ed85b4b18c3ff6fc4b6426baf2002853bd5f6faf
SHA512b9ec6609a397c6d5e292cf3388e173b0a962cd52b3003f6a44cabc130111dd24174695011a2c4006be8391df4db2e68deeb48627fd3a1a719a732b134f73e4dc
-
Filesize
36KB
MD5e2dc75169d3b18dc988ee4fead2b5580
SHA15b73900783d4ceebf1c286c4581a4d0330744159
SHA256afd15c305541e2223a2391e94bfcb3dc5cd558c301e1d3ba1484697b631c9fad
SHA512fa1e363f89234122167bbf4b124d9dd6861df3be450da731b4a43783675d4a9c9f72092fb5d02cfac5d06bb434dd187761b6545783b2185a71dd212aec4c1b59
-
Filesize
36KB
MD5d23b958b292229b9c4449af4799e5199
SHA14edca4f5650a46b49f38cdc3da76df63be05d00a
SHA256590c7a8236b0a29ae55e001361e3365bcaaeefe732d6061da12175343026e50a
SHA5121e758b59e2b89c8313027d609949eeadc4a40ebe9c27de72bf16be4f0a5e8dafceb787d92e1324f217059bd83363368718d4bbf88841fbb50cd11d3113177c56