Analysis
-
max time kernel
0s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 07:08
Behavioral task
behavioral1
Sample
2ccbdb7e5ee99f42139c7d03e84d657a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2ccbdb7e5ee99f42139c7d03e84d657a.exe
Resource
win10v2004-20231215-en
General
-
Target
2ccbdb7e5ee99f42139c7d03e84d657a.exe
-
Size
365KB
-
MD5
2ccbdb7e5ee99f42139c7d03e84d657a
-
SHA1
debae0802f3c4d36602030a81fa5080da6a511bc
-
SHA256
97baf60d4a7a53d0eefd438405a01856036abe9312e06de8bcdd50b4ab275b5e
-
SHA512
c8cf3e9fb8fbe2b691e912f11b35fa001c148ddd1c4101b5af1104ced9fa9c39b39ff3cbc7afdb14fde0303bbadebedb615af4cb75b9335a4dc3dfd8774838cd
-
SSDEEP
6144:hGyGjUW3C45YFxjTG0DJ4IeuNQWTbpMn4Qh0PlyGRWnxBhQDj6A9q5yb82Yf:h3a5UMITNiHiljUThebqw82Q
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 920 96ayXxEhpcYNulm.exe 1956 CTS.exe 4736 setup-stub.exe -
Loads dropped DLL 8 IoCs
pid Process 4736 setup-stub.exe 4736 setup-stub.exe 4736 setup-stub.exe 4736 setup-stub.exe 4736 setup-stub.exe 4736 setup-stub.exe 4736 setup-stub.exe 4736 setup-stub.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/3576-0-0x0000000000950000-0x0000000000967000-memory.dmp upx behavioral2/memory/3576-11-0x0000000000950000-0x0000000000967000-memory.dmp upx behavioral2/memory/1956-9-0x0000000000480000-0x0000000000497000-memory.dmp upx behavioral2/memory/920-7-0x0000000000400000-0x0000000000443000-memory.dmp upx behavioral2/memory/1956-104-0x0000000000480000-0x0000000000497000-memory.dmp upx behavioral2/memory/920-103-0x0000000000400000-0x0000000000443000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" 2ccbdb7e5ee99f42139c7d03e84d657a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" CTS.exe -
Drops file in Program Files directory 6 IoCs
description ioc Process File opened for modification C:\Program Files\Mozilla Firefox\nsb3E91.tmp\ setup-stub.exe File opened for modification C:\Program Files\Mozilla Firefox\nsr3EA3.tmp setup-stub.exe File opened for modification C:\Program Files\Mozilla Firefox\nsr3EA4.tmp setup-stub.exe File opened for modification C:\Program Files\Mozilla Firefox\nsr3EA3.tmp\ setup-stub.exe File opened for modification C:\Program Files\Mozilla Firefox\nsb3E91.tmp setup-stub.exe File opened for modification C:\Program Files\Mozilla Firefox\nsb3E92.tmp setup-stub.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CTS.exe 2ccbdb7e5ee99f42139c7d03e84d657a.exe File created C:\Windows\CTS.exe CTS.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3576 2ccbdb7e5ee99f42139c7d03e84d657a.exe Token: SeDebugPrivilege 1956 CTS.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3576 wrote to memory of 920 3576 2ccbdb7e5ee99f42139c7d03e84d657a.exe 22 PID 3576 wrote to memory of 920 3576 2ccbdb7e5ee99f42139c7d03e84d657a.exe 22 PID 3576 wrote to memory of 920 3576 2ccbdb7e5ee99f42139c7d03e84d657a.exe 22 PID 3576 wrote to memory of 1956 3576 2ccbdb7e5ee99f42139c7d03e84d657a.exe 21 PID 3576 wrote to memory of 1956 3576 2ccbdb7e5ee99f42139c7d03e84d657a.exe 21 PID 3576 wrote to memory of 1956 3576 2ccbdb7e5ee99f42139c7d03e84d657a.exe 21 PID 920 wrote to memory of 4736 920 96ayXxEhpcYNulm.exe 19 PID 920 wrote to memory of 4736 920 96ayXxEhpcYNulm.exe 19 PID 920 wrote to memory of 4736 920 96ayXxEhpcYNulm.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ccbdb7e5ee99f42139c7d03e84d657a.exe"C:\Users\Admin\AppData\Local\Temp\2ccbdb7e5ee99f42139c7d03e84d657a.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Windows\CTS.exe"C:\Windows\CTS.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
C:\Users\Admin\AppData\Local\Temp\96ayXxEhpcYNulm.exeC:\Users\Admin\AppData\Local\Temp\96ayXxEhpcYNulm.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:920
-
-
C:\Users\Admin\AppData\Local\Temp\7zS893C6137\setup-stub.exe.\setup-stub.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
PID:4736