Analysis
-
max time kernel
141s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 04:16
Behavioral task
behavioral1
Sample
27ccae91a7b75ee9cb0dd3fbbf0a49bb.exe
Resource
win7-20231129-en
windows7-x64
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
27ccae91a7b75ee9cb0dd3fbbf0a49bb.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
7 signatures
150 seconds
General
-
Target
27ccae91a7b75ee9cb0dd3fbbf0a49bb.exe
-
Size
130KB
-
MD5
27ccae91a7b75ee9cb0dd3fbbf0a49bb
-
SHA1
3030ae42ebd2593516bafa1e6ff8f5e80171010b
-
SHA256
7246a8818630033c69d2cb10eb999c757c2b320e13d2b44e0182c88d37a44bf6
-
SHA512
a6cbb0d8606b0a5c4a9dfe63d6bd365b625761bcc42e50868518f51eb21795d5211909e7b34886e1ef4a7c8ec59bc4d34d34aa0efffcfd0f3177d70acab143cc
-
SSDEEP
3072:sr3KcWmjRrzS4Wdsl+N+vcyd72KrTZTm+n2mFYLlkiEQVz:/IWxocO7RrNTm+2mglkiEQVz
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 392 8SEj2sBv6LQtUGu.exe 2904 CTS.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/940-0-0x0000000000370000-0x0000000000387000-memory.dmp upx behavioral2/memory/2904-10-0x00000000008B0000-0x00000000008C7000-memory.dmp upx behavioral2/memory/940-9-0x0000000000370000-0x0000000000387000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" 27ccae91a7b75ee9cb0dd3fbbf0a49bb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" CTS.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CTS.exe 27ccae91a7b75ee9cb0dd3fbbf0a49bb.exe File created C:\Windows\CTS.exe CTS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 940 27ccae91a7b75ee9cb0dd3fbbf0a49bb.exe Token: SeDebugPrivilege 2904 CTS.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 940 wrote to memory of 392 940 27ccae91a7b75ee9cb0dd3fbbf0a49bb.exe 20 PID 940 wrote to memory of 392 940 27ccae91a7b75ee9cb0dd3fbbf0a49bb.exe 20 PID 940 wrote to memory of 2904 940 27ccae91a7b75ee9cb0dd3fbbf0a49bb.exe 19 PID 940 wrote to memory of 2904 940 27ccae91a7b75ee9cb0dd3fbbf0a49bb.exe 19 PID 940 wrote to memory of 2904 940 27ccae91a7b75ee9cb0dd3fbbf0a49bb.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\27ccae91a7b75ee9cb0dd3fbbf0a49bb.exe"C:\Users\Admin\AppData\Local\Temp\27ccae91a7b75ee9cb0dd3fbbf0a49bb.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\CTS.exe"C:\Windows\CTS.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2904
-
-
C:\Users\Admin\AppData\Local\Temp\8SEj2sBv6LQtUGu.exeC:\Users\Admin\AppData\Local\Temp\8SEj2sBv6LQtUGu.exe2⤵
- Executes dropped EXE
PID:392
-