Analysis
-
max time kernel
41s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 04:54
Behavioral task
behavioral1
Sample
2900a61eb29a80a368fbb6930396212d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2900a61eb29a80a368fbb6930396212d.exe
Resource
win10v2004-20231215-en
General
-
Target
2900a61eb29a80a368fbb6930396212d.exe
-
Size
341KB
-
MD5
2900a61eb29a80a368fbb6930396212d
-
SHA1
fedcb5ab469a93328f3cede81119308686ca35b5
-
SHA256
f9474d7e4bb0cb581aab83d0003f3334520d2b55f9e6185a5cfd9b0972c8c815
-
SHA512
63f11365544b5425cae2c5eb1ffbf3e7bb35bf159c120b419a0ccad1de4cd6777b962ce3cef43a80343e6d437de1f731012f4b8107ff0ee70cdc9abedc389bcc
-
SSDEEP
6144:hGFY/6JkMZqf9V7Yo6LHruTDdRvoZplfiF7AlWFSsyS5306OVjyQ6ss:h5WZqf9hQHreYpJi5wWVyS5k5yQJs
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1088 OdzPKRmbPcnSixZ.exe 2384 CTS.exe 3340 setup-stub.exe -
Loads dropped DLL 10 IoCs
pid Process 3340 setup-stub.exe 3340 setup-stub.exe 3340 setup-stub.exe 3340 setup-stub.exe 3340 setup-stub.exe 3340 setup-stub.exe 3340 setup-stub.exe 3340 setup-stub.exe 3340 setup-stub.exe 3340 setup-stub.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/2636-0-0x0000000000C70000-0x0000000000C87000-memory.dmp upx behavioral2/memory/2384-11-0x00000000009A0000-0x00000000009B7000-memory.dmp upx behavioral2/memory/2636-9-0x0000000000C70000-0x0000000000C87000-memory.dmp upx behavioral2/memory/1088-5-0x0000000000400000-0x0000000000446000-memory.dmp upx behavioral2/memory/2384-23-0x00000000009A0000-0x00000000009B7000-memory.dmp upx behavioral2/memory/1088-21-0x0000000000400000-0x0000000000446000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" 2900a61eb29a80a368fbb6930396212d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" CTS.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File opened for modification C:\Program Files\Mozilla Firefox\nsp11E0.tmp setup-stub.exe File opened for modification C:\Program Files\Mozilla Firefox\nsp11DF.tmp\ setup-stub.exe File opened for modification C:\Program Files\Mozilla Firefox\nsp11E1.tmp setup-stub.exe File opened for modification C:\Program Files\Mozilla Firefox\nsp11E2.tmp setup-stub.exe File opened for modification C:\Program Files\Mozilla Firefox\nsp11E1.tmp\ setup-stub.exe File opened for modification C:\Program Files\Mozilla Firefox\nsp11DF.tmp setup-stub.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CTS.exe 2900a61eb29a80a368fbb6930396212d.exe File created C:\Windows\CTS.exe CTS.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2636 2900a61eb29a80a368fbb6930396212d.exe Token: SeDebugPrivilege 2384 CTS.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2636 wrote to memory of 1088 2636 2900a61eb29a80a368fbb6930396212d.exe 45 PID 2636 wrote to memory of 1088 2636 2900a61eb29a80a368fbb6930396212d.exe 45 PID 2636 wrote to memory of 1088 2636 2900a61eb29a80a368fbb6930396212d.exe 45 PID 2636 wrote to memory of 2384 2636 2900a61eb29a80a368fbb6930396212d.exe 44 PID 2636 wrote to memory of 2384 2636 2900a61eb29a80a368fbb6930396212d.exe 44 PID 2636 wrote to memory of 2384 2636 2900a61eb29a80a368fbb6930396212d.exe 44 PID 1088 wrote to memory of 3340 1088 OdzPKRmbPcnSixZ.exe 94 PID 1088 wrote to memory of 3340 1088 OdzPKRmbPcnSixZ.exe 94 PID 1088 wrote to memory of 3340 1088 OdzPKRmbPcnSixZ.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\2900a61eb29a80a368fbb6930396212d.exe"C:\Users\Admin\AppData\Local\Temp\2900a61eb29a80a368fbb6930396212d.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\CTS.exe"C:\Windows\CTS.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2384
-
-
C:\Users\Admin\AppData\Local\Temp\OdzPKRmbPcnSixZ.exeC:\Users\Admin\AppData\Local\Temp\OdzPKRmbPcnSixZ.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\7zS04454677\setup-stub.exe.\setup-stub.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:3340
-
-