Analysis
-
max time kernel
140s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 14:51
Behavioral task
behavioral1
Sample
cd5d554f07ef18b9434ed76f86d3a4bf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
cd5d554f07ef18b9434ed76f86d3a4bf.exe
Resource
win10v2004-20231215-en
General
-
Target
cd5d554f07ef18b9434ed76f86d3a4bf.exe
-
Size
458KB
-
MD5
cd5d554f07ef18b9434ed76f86d3a4bf
-
SHA1
65e02d78abc0e03a9697bce22df126bba27d7648
-
SHA256
6ef1fe6922c9445f822d0ebe173084c2dbf4880e563aefec59eba2bbff24057c
-
SHA512
1609effdd8a2df02c5ae1208169e6e3ce70fcc07a09f92f933de23299c136f71b2b93245a530530c4fb6739db745a4c12f497db4b3d00c19aa3d54266802b5a2
-
SSDEEP
12288:/CaTv5FqXwKswrFX0GopbPj20cexPpxRaP:/CaL2XRjhlopb/cgP2
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2424 3Zq1uxOOPRzs8R9.exe 2684 CTS.exe -
Loads dropped DLL 1 IoCs
pid Process 2012 cd5d554f07ef18b9434ed76f86d3a4bf.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x000c000000012695-13.dat upx behavioral1/memory/2684-16-0x0000000000B10000-0x0000000000B27000-memory.dmp upx behavioral1/memory/2012-11-0x0000000000FF0000-0x0000000001007000-memory.dmp upx behavioral1/files/0x000c000000012695-10.dat upx behavioral1/memory/2012-0-0x0000000000FF0000-0x0000000001007000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" CTS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" cd5d554f07ef18b9434ed76f86d3a4bf.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CTS.exe cd5d554f07ef18b9434ed76f86d3a4bf.exe File created C:\Windows\CTS.exe CTS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2012 cd5d554f07ef18b9434ed76f86d3a4bf.exe Token: SeDebugPrivilege 2684 CTS.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2012 wrote to memory of 2424 2012 cd5d554f07ef18b9434ed76f86d3a4bf.exe 15 PID 2012 wrote to memory of 2424 2012 cd5d554f07ef18b9434ed76f86d3a4bf.exe 15 PID 2012 wrote to memory of 2424 2012 cd5d554f07ef18b9434ed76f86d3a4bf.exe 15 PID 2012 wrote to memory of 2424 2012 cd5d554f07ef18b9434ed76f86d3a4bf.exe 15 PID 2012 wrote to memory of 2684 2012 cd5d554f07ef18b9434ed76f86d3a4bf.exe 14 PID 2012 wrote to memory of 2684 2012 cd5d554f07ef18b9434ed76f86d3a4bf.exe 14 PID 2012 wrote to memory of 2684 2012 cd5d554f07ef18b9434ed76f86d3a4bf.exe 14 PID 2012 wrote to memory of 2684 2012 cd5d554f07ef18b9434ed76f86d3a4bf.exe 14
Processes
-
C:\Windows\CTS.exe"C:\Windows\CTS.exe"1⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
C:\Users\Admin\AppData\Local\Temp\3Zq1uxOOPRzs8R9.exeC:\Users\Admin\AppData\Local\Temp\3Zq1uxOOPRzs8R9.exe1⤵
- Executes dropped EXE
PID:2424
-
C:\Users\Admin\AppData\Local\Temp\cd5d554f07ef18b9434ed76f86d3a4bf.exe"C:\Users\Admin\AppData\Local\Temp\cd5d554f07ef18b9434ed76f86d3a4bf.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD554eef5dda6400725cd2a9b8bdd632278
SHA1fd21182c475fdd0cfe4dc43111836ef408beb03b
SHA256c43a470a3e1a84f748505e17939aae3c692ce16a089341d60e1c3c775ed2766e
SHA51224ec84957f785c0dd99a86ae656d7b4b2469486a8f49c0998a2c04a0337264bdb25ab6ecb15862fcdf640fa1dc7ee3c78c066468fbe27990e131067a2ed8b8fb
-
Filesize
71KB
MD557dc894376d6ffbf9af1929bd6688b6c
SHA1cf5f1891e39142f13d3f007e2957a0d302efafff
SHA25625001e3946468d3aa0f86f1ae322fb8354fc1c96052227346c41fb12d63fa129
SHA512922c081df01cdcaef8cf91a484bdfe1c412a5e716aada86b3f3f61e020173cc9bd8318c072eff7f59140687fdaf3a722d62fc4c56891f906797a909da311dab1
-
Filesize
386KB
MD5447364e59e5ab164fe9e2c329b950dbe
SHA1e81fd3f1f1d4fd80cb31b570bc5ddce0226003de
SHA256c03382ed7243a1c913401c533dc15e7e01d75c773ea5355c69353c582d836fbc
SHA5127f37ff7033e126eb76907e8c70c8b89d97f93b6624a4430b4c1ee8d0a45b0e1af9cd898c1a4a36891ec2fe9045cc2efb0d9f0e9dadb8e7273480073c01a66296