Analysis

  • max time kernel
    118s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2023, 16:30

General

  • Target

    f1865f60de05919bfb18eedc8a21af1d.exe

  • Size

    219KB

  • MD5

    f1865f60de05919bfb18eedc8a21af1d

  • SHA1

    93497c59bdcb5065782feb367519af65aba43567

  • SHA256

    daa19c558ca6d23d2049c4bc6dcd39b4b6893cf9fe0888306e4271896cc1a768

  • SHA512

    3a12d440e0f84021f8ebc821e67b5af15bddaa4b10805518684a3d1736ceb8f3bcbf85666e03dd53aa7095d8d5b037f627518b1282942fe59440a913af78427f

  • SSDEEP

    3072:bjr87S7Gnzbo6KcWmjRrz3gg59TDd3+X0PqsIFL8lQubKot8ZefaD9:AZvMG1TDdOX0CsKAlQ0KoXfah

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f1865f60de05919bfb18eedc8a21af1d.exe
    "C:\Users\Admin\AppData\Local\Temp\f1865f60de05919bfb18eedc8a21af1d.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2748
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:2268

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7iNbuUhfmW535QG.exe

    Filesize

    92KB

    MD5

    bc2aa76ba0e19a580e1c4af7915f69a6

    SHA1

    3189f8e347bab0e7dd52e73012c0011564f5041b

    SHA256

    75453eeb89bcbe57fff998ee199a92c6bbc47191da0bbd7171c8c91457398fc8

    SHA512

    ffee4f2bd0e4350a8bd9d103ddf0e96fe12975cec7df2a80dc746d3381276283458f9f1a1d8d77ee72e65b2146cc627a7fdc680ca0511cd77a01d23f6587adbf

  • C:\Windows\CTS.exe

    Filesize

    117KB

    MD5

    90560322e00c64a66ef2099f55ff1f09

    SHA1

    1404109a21e4656daa9dc570c32e6385b6634344

    SHA256

    69346cf100b44fce4b64c433efc47601922b255c5d4182f4ecf1fcff1ca05bf4

    SHA512

    164e6e7654b55727940b212d56df47043f11e612b04cdfbc4c33ad455bbb5b1cece3882acc944cd526f3c5dcd519bcd1d01a3d796e95902bfc680f51dfe74f61

  • memory/2268-12-0x0000000000970000-0x0000000000987000-memory.dmp

    Filesize

    92KB

  • memory/2748-0-0x00000000003F0000-0x0000000000407000-memory.dmp

    Filesize

    92KB

  • memory/2748-9-0x00000000003F0000-0x0000000000407000-memory.dmp

    Filesize

    92KB

  • memory/2748-5-0x00000000003B0000-0x00000000003C7000-memory.dmp

    Filesize

    92KB