Analysis
-
max time kernel
156s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03/02/2024, 02:31
Behavioral task
behavioral1
Sample
8b2af66c4991ce602354a9ed54b74572.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8b2af66c4991ce602354a9ed54b74572.exe
Resource
win10v2004-20231215-en
General
-
Target
8b2af66c4991ce602354a9ed54b74572.exe
-
Size
62KB
-
MD5
8b2af66c4991ce602354a9ed54b74572
-
SHA1
80fae8db44a1c173b0063c0962b837e71c56c904
-
SHA256
bcbb8f7b5fe277e137d113a00d8daefec69ff56e54d8c989eb874fdc07b19ed2
-
SHA512
e7cde0b845bf9b41377fd258ba71145238d95fdc488afd98e0553dab5b3c895a6b3be180e44e5efefdc44ecae08f92cc0ccb11c51c90d7c2fc66faf67961b5bb
-
SSDEEP
768:XocAX3LKew369lp2z3Sd4baFXLjwP/Tgj93b8NIocVSEFGocAX3LKew369lp2z37:SKcR4mjD9r823FHKcR4mjD9r823FLWSa
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3092 CTS.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/3132-0-0x0000000000840000-0x0000000000857000-memory.dmp upx behavioral2/memory/3132-5-0x0000000000840000-0x0000000000857000-memory.dmp upx behavioral2/files/0x0007000000023112-7.dat upx behavioral2/memory/3092-8-0x0000000000690000-0x00000000006A7000-memory.dmp upx behavioral2/memory/3132-10-0x0000000000840000-0x0000000000857000-memory.dmp upx behavioral2/files/0x00020000000227c9-13.dat upx behavioral2/memory/3092-25-0x0000000000690000-0x00000000006A7000-memory.dmp upx behavioral2/files/0x000700000002310e-32.dat upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" 8b2af66c4991ce602354a9ed54b74572.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" CTS.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CTS.exe 8b2af66c4991ce602354a9ed54b74572.exe File created C:\Windows\CTS.exe CTS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3132 8b2af66c4991ce602354a9ed54b74572.exe Token: SeDebugPrivilege 3092 CTS.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3132 wrote to memory of 3092 3132 8b2af66c4991ce602354a9ed54b74572.exe 83 PID 3132 wrote to memory of 3092 3132 8b2af66c4991ce602354a9ed54b74572.exe 83 PID 3132 wrote to memory of 3092 3132 8b2af66c4991ce602354a9ed54b74572.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b2af66c4991ce602354a9ed54b74572.exe"C:\Users\Admin\AppData\Local\Temp\8b2af66c4991ce602354a9ed54b74572.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\CTS.exe"C:\Windows\CTS.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
382KB
MD57b24b7dba1a2f27fccb70c6e093a8e93
SHA1ac551cdfe5f03eb48e8745b93ceabf9f6ab6687f
SHA256f9c560dd087e707ce11546335eb93208cfd0382cc349e80684a96e1d4a9494d2
SHA51246592a35083bb015e2af6c1ed79b4115d731d91fbc003a5389102811e6186d7792d03b66e81fc89f552eb818fa2caa00384dd51b6180128ca94d7244a8f9f1be
-
Filesize
62KB
MD5e447c7058da45e3dc9678559c7b0b4d6
SHA1220d8a5b88c565727966b03ce0e4fa58e069605b
SHA256f85c7dc66e63eb5a4d4ac26c0da0edfd359742ce95162687206e69bea2671f4e
SHA512e6e1225d5ee8d82acb8fe80edaaef2adf12da58476b88e98508f1622bc7b9808aee51ca5fe8341d091dcb2fc12387eee55236eea331c9359c02826612dcb7e93
-
Filesize
59KB
MD55efd390d5f95c8191f5ac33c4db4b143
SHA142d81b118815361daa3007f1a40f1576e9a9e0bc
SHA2566028434636f349d801465f77af3a1e387a9c5032942ca6cadb6506d0800f2a74
SHA512720fbe253483dc034307a57a2860c8629a760f883603198d1213f5290b7f236bf0f5f237728ebed50962be83dc7dc4abe61a1e9a55218778495fc6580eb20b3d