Analysis
-
max time kernel
143s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 14:11
Behavioral task
behavioral1
Sample
ba1cdda6016f6bc48245c20fc242b810.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ba1cdda6016f6bc48245c20fc242b810.exe
Resource
win10v2004-20231215-en
General
-
Target
ba1cdda6016f6bc48245c20fc242b810.exe
-
Size
912KB
-
MD5
ba1cdda6016f6bc48245c20fc242b810
-
SHA1
d5de7e0a9d06308687a0c21614d2f73c2bc6e885
-
SHA256
9c3efb0fbb77ff76d63a978cbbf6772f390149e42f3c4284456c70382865b759
-
SHA512
5ec8764f4ce23d6b3ec8e2e25df97dc4fb021d171e576c29ced70ccd93b8d72d4865dbb66ffed252b6bef20431998cba527e14b0de4ae30d61b95c8c63c74c31
-
SSDEEP
24576:/Q/xFf1SeovowhaxZMPjtUPqDuzvknrikFLRZJ:/Q/bdSeoMZM5SqDevgiql
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2980 8DX06QAfmlJMl8C.exe 1240 CTS.exe 2764 8DX06QAfmlJMl8C.exe -
Loads dropped DLL 3 IoCs
pid Process 2016 ba1cdda6016f6bc48245c20fc242b810.exe 2980 8DX06QAfmlJMl8C.exe 2764 8DX06QAfmlJMl8C.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2016-0-0x0000000001390000-0x00000000013A7000-memory.dmp upx behavioral1/files/0x003000000001562f-11.dat upx behavioral1/memory/1240-16-0x0000000001340000-0x0000000001357000-memory.dmp upx behavioral1/memory/2016-13-0x0000000001390000-0x00000000013A7000-memory.dmp upx behavioral1/memory/2016-12-0x0000000001340000-0x0000000001357000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" ba1cdda6016f6bc48245c20fc242b810.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" CTS.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CTS.exe ba1cdda6016f6bc48245c20fc242b810.exe File created C:\Windows\CTS.exe CTS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2016 ba1cdda6016f6bc48245c20fc242b810.exe Token: SeDebugPrivilege 1240 CTS.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2016 wrote to memory of 2980 2016 ba1cdda6016f6bc48245c20fc242b810.exe 28 PID 2016 wrote to memory of 2980 2016 ba1cdda6016f6bc48245c20fc242b810.exe 28 PID 2016 wrote to memory of 2980 2016 ba1cdda6016f6bc48245c20fc242b810.exe 28 PID 2016 wrote to memory of 2980 2016 ba1cdda6016f6bc48245c20fc242b810.exe 28 PID 2016 wrote to memory of 2980 2016 ba1cdda6016f6bc48245c20fc242b810.exe 28 PID 2016 wrote to memory of 2980 2016 ba1cdda6016f6bc48245c20fc242b810.exe 28 PID 2016 wrote to memory of 2980 2016 ba1cdda6016f6bc48245c20fc242b810.exe 28 PID 2016 wrote to memory of 1240 2016 ba1cdda6016f6bc48245c20fc242b810.exe 29 PID 2016 wrote to memory of 1240 2016 ba1cdda6016f6bc48245c20fc242b810.exe 29 PID 2016 wrote to memory of 1240 2016 ba1cdda6016f6bc48245c20fc242b810.exe 29 PID 2016 wrote to memory of 1240 2016 ba1cdda6016f6bc48245c20fc242b810.exe 29 PID 2980 wrote to memory of 2764 2980 8DX06QAfmlJMl8C.exe 30 PID 2980 wrote to memory of 2764 2980 8DX06QAfmlJMl8C.exe 30 PID 2980 wrote to memory of 2764 2980 8DX06QAfmlJMl8C.exe 30 PID 2980 wrote to memory of 2764 2980 8DX06QAfmlJMl8C.exe 30 PID 2980 wrote to memory of 2764 2980 8DX06QAfmlJMl8C.exe 30 PID 2980 wrote to memory of 2764 2980 8DX06QAfmlJMl8C.exe 30 PID 2980 wrote to memory of 2764 2980 8DX06QAfmlJMl8C.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba1cdda6016f6bc48245c20fc242b810.exe"C:\Users\Admin\AppData\Local\Temp\ba1cdda6016f6bc48245c20fc242b810.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\8DX06QAfmlJMl8C.exeC:\Users\Admin\AppData\Local\Temp\8DX06QAfmlJMl8C.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\Temp\{3836FECB-938F-4EF3-9A9C-4E8941187831}\.cr\8DX06QAfmlJMl8C.exe"C:\Windows\Temp\{3836FECB-938F-4EF3-9A9C-4E8941187831}\.cr\8DX06QAfmlJMl8C.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\8DX06QAfmlJMl8C.exe" -burn.filehandle.attached=180 -burn.filehandle.self=1883⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2764
-
-
-
C:\Windows\CTS.exe"C:\Windows\CTS.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1240
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
764KB
MD5222cda2984ba67f9905cbc2b77a07469
SHA1faa8ca054e2619e18a484eaf217ccc3c66c895da
SHA2561657aa5ef284c9174a8450b661a255f9f6511be91e38df780e4abd788bc0ce21
SHA51241d55732ae94e76633dc38671758cbe75ba245f214c5dd56ad2a4e65d890fc1be6b249d14e7cc5a3ae3fe91fc1dfe1d90616a193dd1f5c8e2f2373500446f26f
-
Filesize
71KB
MD522069d1278ebf7d1758e20c4b118c39a
SHA1cfd6c00953bc91dfa91a809e99a230b0ad222eec
SHA256c4875ef691c5e0dbcdc5dd700f610042ec63e251f184150eeb3e7ab1dde3c9ba
SHA5127ffbb4fce2779e7dc7ea19773a843eb174eb9e8dfc136a45ce8606c6c1657887f73409bfc780c391fe38dacc56c8a6ca4f84d3656236d631b42ec2946346b61d
-
Filesize
401KB
MD5ac1fb671c419a3cf526d9d3e991f4366
SHA194613bbbe2023b3e9fd56733d764b97ea1763301
SHA256340f4b12f0a97dd79b8070f3b283b0c342865e34ba848da6fc7999acc379171b
SHA512dd4307b732f4a0112bd616e68726bb3c8fe60f13ddee62fb2f9719fc2409f363f5cc7bf6dcbfcc42bc8449918ebc2d90d5d5e5260cd741dfab949cc529719f25
-
Filesize
520KB
MD5a7173d660c34210c0d5bd07330e8c903
SHA1562e3008939cbba7998aefb349466fb0df506282
SHA2560829ca0d38bdf2f8008e75bb0651507f92a817de1a77a0dab0ad137fbd2cd055
SHA512cfbc118effe8d3051a131680df08c783c44d773114f7d4de31200c203de4e43eec7b0ee783a9597a03f6177abe19f15f107d150a0c5b2e0c7069af8f57776ece
-
Filesize
443KB
MD52718e409bb5fb30f4cc3bfe23d686b7d
SHA10714352e5b81a4ffeb4d89f3c2dccc6b62bc493d
SHA256f1b8ba4d9899df4dc638c265d5de99a48f456618a2f1148030134fd7a51cd2fa
SHA51250ba220004606c9425fa72a1f4dd8791f384bcfb9020acc3ec4533380d276f7cb30f8edadf84d18093d46dd1742b9d5c1db730e845ab1fcfceab3f62205a39dd
-
Filesize
56KB
MD5ca62a92ad5b307faeac640cd5eb460ed
SHA15edf8b5fc931648f77a2a131e4c733f1d31b548e
SHA256f3109977125d4a3a3ffa17462cfc31799589f466a51d226d1d1f87df2f267627
SHA512f7b3001a957f393298b0ff2aa08b400f8639f2f0487a34ac2a0e8d9519765ac92249185ebe45f907bc9d2f8556fdd39095c52f890330a35edf71ae49df32e27a
-
Filesize
841KB
MD5f33aac555c5e5a2c10d07e3bbf9a9e82
SHA175fa5322fdc00223246bc70fcb6772ae9f10e97c
SHA2568977d454b74e2abbafc3be6a3b2e7946d1cde530d742235bc1e5cc229e231aa6
SHA512a64d465c327cd3799044fa1e8786812e055b72aea7faeac66916c7cf1f762bb919d211060cc7944b84037c316babb796ef449d1049a162d8faa51b08d05cef34
-
Filesize
458KB
MD5ce1fa6eab56ba181862b8f7c2ab8a7eb
SHA14205f9841ecb0781d822fd94bd18e8d3573c1dc9
SHA2562c1d77ecd8f943b6fdc04f8e2241bc949628e4795196099264e5a1e7d0207da8
SHA512701e78897759773101557bca266068ff3aec8e3f5e1611fbd5fba84cf304e46c939d60461f682b046731aa2b5c395830e7a4c24b04a0f91dd6012701a9fdeaa0
-
Filesize
504KB
MD5eceacbabccdd5004ddc2d489ea2af763
SHA15cec43ea31f41b8a411729eb0bed804f25a4f112
SHA2565dbebfdd9e20230e37cdfae429b52accb5898314cfc6220b7ee1751946a9c443
SHA51283240f70da834bf399d2b6235b0ba91049b20c8a79c9ca9a5e14f986b527a2bbef44365553d210f8a0ac0c8b9039cb1934bd809413bd7839f3110d0c5e1a9070