Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 12:24

General

  • Target

    186b78ea270673eee3857e539cf17c47.exe

  • Size

    317KB

  • MD5

    186b78ea270673eee3857e539cf17c47

  • SHA1

    77e8905992168906a89fea1d89aa436e9b85c544

  • SHA256

    998711017d5dfff0cae2cbecaa6bc562df30023eb9c567663afb00cb1fd4b8eb

  • SHA512

    976ff6d23ee9115141aeb2e4fc39ed0bb464922122c1773fa1e94a56b12ab475a5627461beda1a85824d99175f2b36ca895165a085555f30bb433e91455fa443

  • SSDEEP

    6144:hGemgUqlcZh6ecXy9gCpCV4VD7jbS2qFpmxa9hovIX5tiqaVN8u5Tw:hAcOh6plCJ3jbS2qVhov2tiN/w

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops file in System32 directory 7 IoCs
  • Drops file in Windows directory 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\186b78ea270673eee3857e539cf17c47.exe
    "C:\Users\Admin\AppData\Local\Temp\186b78ea270673eee3857e539cf17c47.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4012
    • C:\Users\Admin\AppData\Local\Temp\2d3g93BIDIIabz1.exe
      C:\Users\Admin\AppData\Local\Temp\2d3g93BIDIIabz1.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3572
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dxwsetup.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dxwsetup.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in System32 directory
        • Drops file in Windows directory
        PID:2656
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:1224

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

    Filesize

    352KB

    MD5

    6328e5aece1ccc682d17c4739af32e62

    SHA1

    313eeb2dd32339d499f95c38e891865f15b988e0

    SHA256

    d12868b7053e74fa4634989daf3d23cc9a393f6b549baae20e4292f0c9570d08

    SHA512

    5c464205331762cc4533f1880a38bfdfaa89fc5288e2ccf066ab5c9eb61fda5e47816ba48cc684bf28dc35b514a825d277a5a9ac820d3136bf0509bfb98b808a

  • C:\Users\Admin\AppData\Local\Temp\2d3g93BIDIIabz1.exe

    Filesize

    288KB

    MD5

    2cbd6ad183914a0c554f0739069e77d7

    SHA1

    7bf35f2afca666078db35ca95130beb2e3782212

    SHA256

    2cf71d098c608c56e07f4655855a886c3102553f648df88458df616b26fd612f

    SHA512

    ff1af2d2a883865f2412dddcd68006d1907a719fe833319c833f897c93ee750bac494c0991170dc1cf726b3f0406707daa361d06568cd610eeb4ed1d9c0fbb10

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dsetup.dll

    Filesize

    93KB

    MD5

    984cad22fa542a08c5d22941b888d8dc

    SHA1

    3e3522e7f3af329f2235b0f0850d664d5377b3cd

    SHA256

    57bc22850bb8e0bcc511a9b54cd3da18eec61f3088940c07d63b9b74e7fe2308

    SHA512

    8ef171218b331f0591a4b2a5e68dcbae98f5891518ce877f1d8d1769c59c0f4ddae43cc43da6606975078f889c832f0666484db9e047782e7a0ae4a2d41f5bef

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dsetup32.dll

    Filesize

    512KB

    MD5

    31de7c2c651b17c33bff29c16aa9bdf4

    SHA1

    36e06a4f7bc123f2995c8892c5e5e53ff8909611

    SHA256

    23464af565b4d496a45f87dd8daf078b1d03f230914e784f2af51ba29271d963

    SHA512

    6b7e6e078bae2bacc75abc7aa7a4c47d6690f2597a8440058eef6bd2259a2271a9ca41a6300e0469caf6f8398ddca504532b428186df92db5141a70a98ad575b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dxwsetup.exe

    Filesize

    515KB

    MD5

    ac3a5f7be8cd13a863b50ab5fe00b71c

    SHA1

    eee417cd92e263b84dd3b5dcc2b4b463fe6e84d9

    SHA256

    8f5e89298e3dc2e22d47515900c37cca4ee121c5ba06a6d962d40ad6e1a595da

    SHA512

    c8bbe791373dad681f0ac9f5ab538119bde685d4f901f5db085c73163fc2e868972b2de60e72ccd44f745f1fd88fcde2e27f32302d8cbd3c1f43e6e657c79fba

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dxwsetup.inf

    Filesize

    477B

    MD5

    ad8982eaa02c7ad4d7cdcbc248caa941

    SHA1

    4ccd8e038d73a5361d754c7598ed238fc040d16b

    SHA256

    d63c35e9b43eb0f28ffc28f61c9c9a306da9c9de3386770a7eb19faa44dbfc00

    SHA512

    5c805d78bafff06c36b5df6286709ddf2d36808280f92e62dc4c285edd9176195a764d5cf0bb000da53ca8bbf66ddd61d852e4259e3113f6529e2d7bdbdd6e28

  • C:\Windows\CTS.exe

    Filesize

    29KB

    MD5

    70aa23c9229741a9b52e5ce388a883ac

    SHA1

    b42683e21e13de3f71db26635954d992ebe7119e

    SHA256

    9d25cc704b1c00c9d17903e25ca35c319663e997cb9da0b116790b639e9688f2

    SHA512

    be604a2ad5ab8a3e5edb8901016a76042ba873c8d05b4ef8eec31241377ec6b2a883b51c6912dc7640581ffa624547db334683975883ae74e62808b5ae9ab0b5

  • C:\Windows\SysWOW64\directx\websetup\dsetup32.dll

    Filesize

    448KB

    MD5

    488075d665eb731d4f7a5bfac3986760

    SHA1

    1243f2dec1abd9dd4cb0bbb64a7dc6d8bf74ed5f

    SHA256

    457b027bfdfb55bd3925e747ecf13899853b54df8b504f0ab76388965dc94e6d

    SHA512

    5cddc275cfdee3dd30df48f9de1a47680bff85d1b87e29edd59dc344027617a95ce8cb70383e1c1af8ff339f0a100ce6038b97571778ea2c58058dba6e46283f

  • C:\Windows\SysWOW64\directx\websetup\dsetup32.dll

    Filesize

    1.5MB

    MD5

    a5412a144f63d639b47fcc1ba68cb029

    SHA1

    81bd5f1c99b22c0266f3f59959dfb4ea023be47e

    SHA256

    8a011da043a4b81e2b3d41a332e0ff23a65d546bd7636e8bc74885e8746927d6

    SHA512

    2679a4cb690e8d709cb5e57b59315d22f69f91efa6c4ee841943751c882b0c0457fd4a3376ac3832c757c6dfaffb7d844909c5665b86a95339af586097ee0405

  • memory/1224-11-0x0000000000480000-0x0000000000497000-memory.dmp

    Filesize

    92KB

  • memory/1224-8-0x0000000000480000-0x0000000000497000-memory.dmp

    Filesize

    92KB

  • memory/4012-0-0x0000000000450000-0x0000000000467000-memory.dmp

    Filesize

    92KB

  • memory/4012-9-0x0000000000450000-0x0000000000467000-memory.dmp

    Filesize

    92KB