Analysis

  • max time kernel
    152s
  • max time network
    28s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    07/01/2024, 14:40

General

  • Target

    4940cd9046e50c39bc7d2cc55f188137.exe

  • Size

    312KB

  • MD5

    4940cd9046e50c39bc7d2cc55f188137

  • SHA1

    fff85a9a90ac497da30207f7c3f9b62294385d41

  • SHA256

    766b232cc257808eac531a84b30c8a58699afd60ff670d88a607c32ab92f65ea

  • SHA512

    adb5b0ea4b746f42c4f92e774e99e76db74c4811b3bccdf1729d2ca8c51c2f996d0bbd7b5faa5abf40d6bc42c91246fe29f427571cf7b0bb800973ee6714b9b0

  • SSDEEP

    6144:hGyGs3QqiAOGAZmGHVJhMFOCbR5+vA+pS6SvzG2v5K:h3UqiaAFqR5+rKvzGs5K

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4940cd9046e50c39bc7d2cc55f188137.exe
    "C:\Users\Admin\AppData\Local\Temp\4940cd9046e50c39bc7d2cc55f188137.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2764
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:2848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\W0ANZPCIIEyzFSa.exe

    Filesize

    312KB

    MD5

    e02e1b560aea281bed1a5c023e7f7bf9

    SHA1

    2b74e01c7eb35d5848452ebe54e1b928a3cdcfed

    SHA256

    82db5bab66cdeb89f0d82913d8f7352de429ec04e2cda1db97e8595be70bba22

    SHA512

    4997d6db2606fd491b416e1ba29f9d4b34c3d1bcf0f7d669d6076d42a6cd8b18c430ef000b248a7261088f56858dced30a2e54d8e3297bbe64b498551112b372

  • C:\Windows\CTS.exe

    Filesize

    59KB

    MD5

    5efd390d5f95c8191f5ac33c4db4b143

    SHA1

    42d81b118815361daa3007f1a40f1576e9a9e0bc

    SHA256

    6028434636f349d801465f77af3a1e387a9c5032942ca6cadb6506d0800f2a74

    SHA512

    720fbe253483dc034307a57a2860c8629a760f883603198d1213f5290b7f236bf0f5f237728ebed50962be83dc7dc4abe61a1e9a55218778495fc6580eb20b3d

  • memory/2764-0-0x0000000001350000-0x0000000001367000-memory.dmp

    Filesize

    92KB

  • memory/2764-11-0x0000000000160000-0x0000000000177000-memory.dmp

    Filesize

    92KB

  • memory/2764-8-0x0000000001350000-0x0000000001367000-memory.dmp

    Filesize

    92KB

  • memory/2764-18-0x0000000000160000-0x0000000000177000-memory.dmp

    Filesize

    92KB

  • memory/2848-12-0x0000000000FE0000-0x0000000000FF7000-memory.dmp

    Filesize

    92KB