Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 01:10
Behavioral task
behavioral1
Sample
9818150941def9842a1b3c98e4794ef0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9818150941def9842a1b3c98e4794ef0.exe
Resource
win10v2004-20231215-en
General
-
Target
9818150941def9842a1b3c98e4794ef0.exe
-
Size
112KB
-
MD5
9818150941def9842a1b3c98e4794ef0
-
SHA1
83e17140a74df518d59b48b5842d743afde6f8be
-
SHA256
cf342712ac75824579780abdb0e12d7ba9e3d8e93f311e0f3dd5b35f73a6bbc3
-
SHA512
5e156ae52cd2511055086dfecf93240ef1835839bc2683aeea8fd35089f2ad55da660f8de701fdf9f02bae42afd36dd437323a8612532aab3973a063e23469de
-
SSDEEP
1536:UcNjQlsWjcd+xzl7SM+Gn8255NeoVKcR4mjD9r823Fl:Xjr87S7Gnz55EoVKcWmjRrz3L
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3048 CTS.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2108-0-0x00000000012C0000-0x00000000012D9000-memory.dmp upx behavioral1/files/0x000b000000014177-7.dat upx behavioral1/files/0x000d00000001225c-12.dat upx behavioral1/memory/3048-11-0x0000000000840000-0x0000000000859000-memory.dmp upx behavioral1/memory/2108-8-0x00000000012C0000-0x00000000012D9000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" 9818150941def9842a1b3c98e4794ef0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" CTS.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CTS.exe 9818150941def9842a1b3c98e4794ef0.exe File created C:\Windows\CTS.exe CTS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2108 9818150941def9842a1b3c98e4794ef0.exe Token: SeDebugPrivilege 3048 CTS.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2108 wrote to memory of 3048 2108 9818150941def9842a1b3c98e4794ef0.exe 28 PID 2108 wrote to memory of 3048 2108 9818150941def9842a1b3c98e4794ef0.exe 28 PID 2108 wrote to memory of 3048 2108 9818150941def9842a1b3c98e4794ef0.exe 28 PID 2108 wrote to memory of 3048 2108 9818150941def9842a1b3c98e4794ef0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\9818150941def9842a1b3c98e4794ef0.exe"C:\Users\Admin\AppData\Local\Temp\9818150941def9842a1b3c98e4794ef0.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\CTS.exe"C:\Windows\CTS.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112KB
MD5d7270db30a01e708e87a407d6ce37f06
SHA1bc0e63da4d7b1b8924a78677f969df2ed1bb51a6
SHA2567835cd4899b7c67368548cdaaf45e579d53f18e9708bdc20956a971e527309a8
SHA5125ae138fdae5ecb2049e1905d1ca5cd2cc004eb5561080049c7c9243ed979e227b7b3b04e3b9a7567e7429f8c76d5dd510ee2badfa3e71d6e50bf75125adc351b
-
Filesize
112KB
MD55dfd082c2449338733617d2b925e5f01
SHA1e214b88aeeb65e5aff724355d958fb4d30d86181
SHA25623f33569da55f7d02da96b7aa6a3d911937118cfff940aa0fc43de644d15dc7b
SHA5127f8303f7f69827c8fe2b2f12d91ad12860b50665d3c981bf2a5bd6c3e0ecc950b4d2f5312d3fd3ae2a7657baefee7ceded0e574a99d86ef6a3f9fac695127f6e