Analysis
-
max time kernel
147s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 01:36
Behavioral task
behavioral1
Sample
2305d5b36076d4ba067daa4538850630.exe
Resource
win7-20231215-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
2305d5b36076d4ba067daa4538850630.exe
Resource
win10v2004-20231215-en
7 signatures
150 seconds
General
-
Target
2305d5b36076d4ba067daa4538850630.exe
-
Size
103KB
-
MD5
2305d5b36076d4ba067daa4538850630
-
SHA1
71ee7c19971733f397f85c24f481e5760d640d34
-
SHA256
6dd57913bdfe8d3ca180a1359a72fea3a18eb9e3d44551edf5d720806c1146cc
-
SHA512
7f211c3bd59568e8dbfd01d40a50cd74cbe67302deba04d638695fe211e754d9617d5aec59e5b2a368fd2a7212af19e5ab29c80a1499a7e917700ce49c951da6
-
SSDEEP
1536:s9Z3KcR4mjD9r8226+oeZeSULzq2rRfGe2/4Bsi7zbuxk5ArDSqjAiZ:sr3KcWmjRrzSo8CZNbkJi6HSqkY
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3580 q8e36WLR4N6dfep.exe 3968 CTS.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/2808-0-0x0000000000880000-0x0000000000897000-memory.dmp upx behavioral2/memory/3968-8-0x00000000003D0000-0x00000000003E7000-memory.dmp upx behavioral2/memory/2808-7-0x0000000000880000-0x0000000000897000-memory.dmp upx behavioral2/memory/3968-31-0x00000000003D0000-0x00000000003E7000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" 2305d5b36076d4ba067daa4538850630.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" CTS.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CTS.exe 2305d5b36076d4ba067daa4538850630.exe File created C:\Windows\CTS.exe CTS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2808 2305d5b36076d4ba067daa4538850630.exe Token: SeDebugPrivilege 3968 CTS.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2808 wrote to memory of 3580 2808 2305d5b36076d4ba067daa4538850630.exe 23 PID 2808 wrote to memory of 3580 2808 2305d5b36076d4ba067daa4538850630.exe 23 PID 2808 wrote to memory of 3580 2808 2305d5b36076d4ba067daa4538850630.exe 23 PID 2808 wrote to memory of 3968 2808 2305d5b36076d4ba067daa4538850630.exe 22 PID 2808 wrote to memory of 3968 2808 2305d5b36076d4ba067daa4538850630.exe 22 PID 2808 wrote to memory of 3968 2808 2305d5b36076d4ba067daa4538850630.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\2305d5b36076d4ba067daa4538850630.exe"C:\Users\Admin\AppData\Local\Temp\2305d5b36076d4ba067daa4538850630.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\CTS.exe"C:\Windows\CTS.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3968
-
-
C:\Users\Admin\AppData\Local\Temp\q8e36WLR4N6dfep.exeC:\Users\Admin\AppData\Local\Temp\q8e36WLR4N6dfep.exe2⤵
- Executes dropped EXE
PID:3580
-