Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 14:16
Behavioral task
behavioral1
Sample
4115123d26089f2ce09fffb8aa7e45ed.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4115123d26089f2ce09fffb8aa7e45ed.exe
Resource
win10v2004-20231215-en
General
-
Target
4115123d26089f2ce09fffb8aa7e45ed.exe
-
Size
93KB
-
MD5
4115123d26089f2ce09fffb8aa7e45ed
-
SHA1
ff430b58bf30a551e088fcf23670643449adcc5d
-
SHA256
8d6f3c6ba6daa46ca65a19d91ac95fb0929aeed94954fc9cc99e4abecc256904
-
SHA512
07c435c4270b7f4266d832bacec231a1b15dc104502e28c175622e8a5a5538142d04240d53280d97d8c26c2a8ee912455aceac42c9f7e5cf44220bc0a0b4f446
-
SSDEEP
1536:SKcR4mjD9r823FIKNqlkQ8z2iVBrSKSwe8xwwkZs3IXEP:SKcWmjRrz3m2qz0lXkZs3ic
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1612 5Wr9PcVcX3l6cMT.exe 2864 CTS.exe -
Loads dropped DLL 2 IoCs
pid Process 2072 4115123d26089f2ce09fffb8aa7e45ed.exe 2072 4115123d26089f2ce09fffb8aa7e45ed.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2072-14-0x0000000000B60000-0x0000000000B77000-memory.dmp upx behavioral1/memory/2864-18-0x00000000012B0000-0x00000000012C7000-memory.dmp upx behavioral1/files/0x000c000000015cbd-17.dat upx behavioral1/memory/2072-2-0x0000000000B60000-0x0000000000B77000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" 4115123d26089f2ce09fffb8aa7e45ed.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" CTS.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CTS.exe 4115123d26089f2ce09fffb8aa7e45ed.exe File created C:\Windows\CTS.exe CTS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2072 4115123d26089f2ce09fffb8aa7e45ed.exe Token: SeDebugPrivilege 2864 CTS.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2072 wrote to memory of 1612 2072 4115123d26089f2ce09fffb8aa7e45ed.exe 18 PID 2072 wrote to memory of 1612 2072 4115123d26089f2ce09fffb8aa7e45ed.exe 18 PID 2072 wrote to memory of 1612 2072 4115123d26089f2ce09fffb8aa7e45ed.exe 18 PID 2072 wrote to memory of 1612 2072 4115123d26089f2ce09fffb8aa7e45ed.exe 18 PID 2072 wrote to memory of 2864 2072 4115123d26089f2ce09fffb8aa7e45ed.exe 16 PID 2072 wrote to memory of 2864 2072 4115123d26089f2ce09fffb8aa7e45ed.exe 16 PID 2072 wrote to memory of 2864 2072 4115123d26089f2ce09fffb8aa7e45ed.exe 16 PID 2072 wrote to memory of 2864 2072 4115123d26089f2ce09fffb8aa7e45ed.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\4115123d26089f2ce09fffb8aa7e45ed.exe"C:\Users\Admin\AppData\Local\Temp\4115123d26089f2ce09fffb8aa7e45ed.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\CTS.exe"C:\Windows\CTS.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
-
C:\Users\Admin\AppData\Local\Temp\5Wr9PcVcX3l6cMT.exeC:\Users\Admin\AppData\Local\Temp\5Wr9PcVcX3l6cMT.exe2⤵
- Executes dropped EXE
PID:1612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD56aa1034994d332f9c0fa68cf0e120ceb
SHA199db73170d85f813d7c190dc04c518cd67e28edf
SHA256702dd33aa43b57f50fcf98ec76c5548218db7ebfa00e56425d53eb1d543dc029
SHA512234a6b26a33261212b87961b03b9368ed58acfb3d1ccb08613bdadacdcf4db60d53f1cbb2a25fc56c2216aee53316795bbddfd77d51428591ade32a7046c8482
-
Filesize
64KB
MD5a32a382b8a5a906e03a83b4f3e5b7a9b
SHA111e2bdd0798761f93cce363329996af6c17ed796
SHA25675f12ea2f30d9c0d872dade345f30f562e6d93847b6a509ba53beec6d0b2c346
SHA512ec87dd957be21b135212454646dcabdd7ef9442cf714e2c1f6b42b81f0c3fa3b1875bde9a8b538e8a0aa2190225649c29e9ed0f25176e7659e55e422dd4efe4c
-
Filesize
29KB
MD570aa23c9229741a9b52e5ce388a883ac
SHA1b42683e21e13de3f71db26635954d992ebe7119e
SHA2569d25cc704b1c00c9d17903e25ca35c319663e997cb9da0b116790b639e9688f2
SHA512be604a2ad5ab8a3e5edb8901016a76042ba873c8d05b4ef8eec31241377ec6b2a883b51c6912dc7640581ffa624547db334683975883ae74e62808b5ae9ab0b5