Analysis
-
max time kernel
198s -
max time network
212s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 02:38
Behavioral task
behavioral1
Sample
47ce344bd16236c8905688eb66bb921c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
47ce344bd16236c8905688eb66bb921c.exe
Resource
win10v2004-20231215-en
General
-
Target
47ce344bd16236c8905688eb66bb921c.exe
-
Size
363KB
-
MD5
47ce344bd16236c8905688eb66bb921c
-
SHA1
161cc2d7b487a50e0435b62a8e0096ea810d4410
-
SHA256
472f5301348a9a184884728b220e5be90fbd6713e775b3cac716990b21f85b62
-
SHA512
9c1b46139b6e950cd911335a3b68621f057047866f89f2f9e2cb419a28bdba08025cc3c9bc3f5075643858d3e54dfd141fcce9625c03bdc2249671693674a829
-
SSDEEP
6144:hGnnBSi7rWHU7n733qtsUdvOc7kamIz0f7GzIpZ+/mDW1hoUsXTsYjgH9ad5:h8B6HUX3atBYaefCzE+KW1OUWsYkH9G
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4092 X7OuHQXSLkLqLH5.exe 2604 CTS.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/3828-0-0x0000000000FA0000-0x0000000000FB7000-memory.dmp upx behavioral2/memory/3828-6-0x0000000000FA0000-0x0000000000FB7000-memory.dmp upx behavioral2/files/0x000600000002320d-7.dat upx behavioral2/memory/2604-8-0x0000000000600000-0x0000000000617000-memory.dmp upx behavioral2/memory/2604-11-0x0000000000600000-0x0000000000617000-memory.dmp upx behavioral2/files/0x0003000000022707-14.dat upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" 47ce344bd16236c8905688eb66bb921c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" CTS.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CTS.exe 47ce344bd16236c8905688eb66bb921c.exe File created C:\Windows\CTS.exe CTS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3828 47ce344bd16236c8905688eb66bb921c.exe Token: SeDebugPrivilege 2604 CTS.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3828 wrote to memory of 2604 3828 47ce344bd16236c8905688eb66bb921c.exe 90 PID 3828 wrote to memory of 2604 3828 47ce344bd16236c8905688eb66bb921c.exe 90 PID 3828 wrote to memory of 2604 3828 47ce344bd16236c8905688eb66bb921c.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\47ce344bd16236c8905688eb66bb921c.exe"C:\Users\Admin\AppData\Local\Temp\47ce344bd16236c8905688eb66bb921c.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\X7OuHQXSLkLqLH5.exeC:\Users\Admin\AppData\Local\Temp\X7OuHQXSLkLqLH5.exe2⤵
- Executes dropped EXE
PID:4092
-
-
C:\Windows\CTS.exe"C:\Windows\CTS.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
352KB
MD529083243a278aa6ad1bd92e9c07b8700
SHA177f0c88c102cbca2a7ba74109869ca290471e4e6
SHA2560dfdbc7a76f72e113e4e5db5a26813b88fc94c08068ee6bb888cf0d55b2e5d66
SHA51239ed8a8f520d789a30acfbf5b8ca173753ce709405d26f6394ddb0c30272eaf283d2b2cc187c9c233a49862f372530d3824bef59d776a933458aed5ab327341b
-
Filesize
334KB
MD5f310d4e936b68a5d76b7b808507e99f9
SHA16dccf493508f97212688413bec28f86befbff8e2
SHA25658b7e175725ddf68a7a6c891889daaa3b7d4f90c14bfcff287cb3336cbd7da60
SHA512daead56dfdd7b4a7a8fabdc6e12144273aae244aa90817d76281e5a7414e3f07ca2761f481bda91a47fc3c1c911ff1783e7421e566e3b3fc59b443de141d9e5d
-
Filesize
29KB
MD570aa23c9229741a9b52e5ce388a883ac
SHA1b42683e21e13de3f71db26635954d992ebe7119e
SHA2569d25cc704b1c00c9d17903e25ca35c319663e997cb9da0b116790b639e9688f2
SHA512be604a2ad5ab8a3e5edb8901016a76042ba873c8d05b4ef8eec31241377ec6b2a883b51c6912dc7640581ffa624547db334683975883ae74e62808b5ae9ab0b5