Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 14:06
Behavioral task
behavioral1
Sample
b7254d758341d446daa16cc9c9cd6d4c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
b7254d758341d446daa16cc9c9cd6d4c.exe
Resource
win10v2004-20231215-en
General
-
Target
b7254d758341d446daa16cc9c9cd6d4c.exe
-
Size
130KB
-
MD5
b7254d758341d446daa16cc9c9cd6d4c
-
SHA1
087a5bae305600aa9fe1a294581801fac09ac4ef
-
SHA256
26dda853b5d6f5d9df23b9b26b5e287268b4e3323272d193ad366a0bc59d2ad4
-
SHA512
2bdeab1fb6e86fc1897e0a60b7adb15b99962da185fe97cb7634d354698f02113c4d3a268c509f5ee788b61fa54ba8c8346e17bb6681c0715d3469909501217b
-
SSDEEP
3072:sr3KcWmjRrzSE5/XwqlJ5oe/ziC20MJmYHgBCsN0bvsGz8I:/sXl/bIKYYHo5QI
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4776 8l3T5CJJnnH0anb.exe 4912 CTS.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/2472-0-0x0000000000CB0000-0x0000000000CC7000-memory.dmp upx behavioral2/files/0x000700000002320d-7.dat upx behavioral2/memory/4912-9-0x0000000000300000-0x0000000000317000-memory.dmp upx behavioral2/memory/2472-8-0x0000000000CB0000-0x0000000000CC7000-memory.dmp upx behavioral2/files/0x000300000002275e-13.dat upx behavioral2/memory/4912-32-0x0000000000300000-0x0000000000317000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" b7254d758341d446daa16cc9c9cd6d4c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" CTS.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CTS.exe b7254d758341d446daa16cc9c9cd6d4c.exe File created C:\Windows\CTS.exe CTS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2472 b7254d758341d446daa16cc9c9cd6d4c.exe Token: SeDebugPrivilege 4912 CTS.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2472 wrote to memory of 4776 2472 b7254d758341d446daa16cc9c9cd6d4c.exe 19 PID 2472 wrote to memory of 4776 2472 b7254d758341d446daa16cc9c9cd6d4c.exe 19 PID 2472 wrote to memory of 4912 2472 b7254d758341d446daa16cc9c9cd6d4c.exe 17 PID 2472 wrote to memory of 4912 2472 b7254d758341d446daa16cc9c9cd6d4c.exe 17 PID 2472 wrote to memory of 4912 2472 b7254d758341d446daa16cc9c9cd6d4c.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7254d758341d446daa16cc9c9cd6d4c.exe"C:\Users\Admin\AppData\Local\Temp\b7254d758341d446daa16cc9c9cd6d4c.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\CTS.exe"C:\Windows\CTS.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4912
-
-
C:\Users\Admin\AppData\Local\Temp\8l3T5CJJnnH0anb.exeC:\Users\Admin\AppData\Local\Temp\8l3T5CJJnnH0anb.exe2⤵
- Executes dropped EXE
PID:4776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94KB
MD59a821d8d62f4c60232b856e98cba7e4f
SHA14ec5dcbd43ad3b0178b26a57b8a2f41e33a48df5
SHA256a5b3bf53bcd3c0296498383837e8f9eb7d610c535521315a96aa740cf769f525
SHA5121b5273a52973dac77ad0ef7aa1dda929a782d762ab8489eb90dff1062dd4cc01e4f7f4157266a2abcf8941e91cf4aa5603de1dd8ee871524748e0989ebaa37d3
-
Filesize
36KB
MD5d23b958b292229b9c4449af4799e5199
SHA14edca4f5650a46b49f38cdc3da76df63be05d00a
SHA256590c7a8236b0a29ae55e001361e3365bcaaeefe732d6061da12175343026e50a
SHA5121e758b59e2b89c8313027d609949eeadc4a40ebe9c27de72bf16be4f0a5e8dafceb787d92e1324f217059bd83363368718d4bbf88841fbb50cd11d3113177c56