Analysis
-
max time kernel
174s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 23:53
Behavioral task
behavioral1
Sample
1af9c1248a805fdedcb9f0351b95ba57.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
1af9c1248a805fdedcb9f0351b95ba57.exe
Resource
win10v2004-20231215-en
7 signatures
150 seconds
General
-
Target
1af9c1248a805fdedcb9f0351b95ba57.exe
-
Size
30KB
-
MD5
1af9c1248a805fdedcb9f0351b95ba57
-
SHA1
34c64a1eaf47c9250f45220ba34fe989c7fb45c7
-
SHA256
78e9c86506ae241fced8d29a3971da840e0022031ac259e4abbfe7f428f24e02
-
SHA512
1d656b1c660d12cb60632a523b30db7b030314abe2d331c31f2f61ffc5efbe1d06c1cb3e01c28985dead223a5bb09908c279680240ae2189ded3b0ae7819e36a
-
SSDEEP
768:XocAX3LKew369lp2z3Sd4baFXLjwP/Tgj93b8NIocVSEFif:SKcR4mjD9r823Fy
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4556 CTS.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/2516-0-0x0000000000B90000-0x0000000000BA7000-memory.dmp upx behavioral2/memory/4556-7-0x00000000007D0000-0x00000000007E7000-memory.dmp upx behavioral2/memory/2516-9-0x0000000000B90000-0x0000000000BA7000-memory.dmp upx behavioral2/memory/4556-31-0x00000000007D0000-0x00000000007E7000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" CTS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" 1af9c1248a805fdedcb9f0351b95ba57.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CTS.exe 1af9c1248a805fdedcb9f0351b95ba57.exe File created C:\Windows\CTS.exe CTS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2516 1af9c1248a805fdedcb9f0351b95ba57.exe Token: SeDebugPrivilege 4556 CTS.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2516 wrote to memory of 4556 2516 1af9c1248a805fdedcb9f0351b95ba57.exe 39 PID 2516 wrote to memory of 4556 2516 1af9c1248a805fdedcb9f0351b95ba57.exe 39 PID 2516 wrote to memory of 4556 2516 1af9c1248a805fdedcb9f0351b95ba57.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\1af9c1248a805fdedcb9f0351b95ba57.exe"C:\Users\Admin\AppData\Local\Temp\1af9c1248a805fdedcb9f0351b95ba57.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\CTS.exe"C:\Windows\CTS.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4556
-