Analysis
-
max time kernel
90s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 05:20
Behavioral task
behavioral1
Sample
9893c911c89080f14e015612d75e649b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9893c911c89080f14e015612d75e649b.exe
Resource
win10v2004-20231222-en
General
-
Target
9893c911c89080f14e015612d75e649b.exe
-
Size
221KB
-
MD5
9893c911c89080f14e015612d75e649b
-
SHA1
a849312fd08bd8e73c5e440955949bd0f8e13b36
-
SHA256
1dc72890b2ec6345a0db62742d86f7225e504033ba7077791c09d969e2b55c80
-
SHA512
bd57c403010369fb60d9e40aa38bcb7b4ddc4f0e75f56ea2f496ad6f10566dfc7eec2ee6c38df33f824f00a57672c5291c3cb29dfa30f5bbbe953e5389ff0842
-
SSDEEP
3072:vjr5ELbGnzi+aoJjr5ELbGnzi+aoBV6SfVPT9M3Gki:BhXaKhXauV6EcGki
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3808 FzKuBUZ6bwu7wQU.exe 396 CTS.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/3976-0-0x00000000000E0000-0x00000000000F9000-memory.dmp upx behavioral2/memory/3976-8-0x00000000000E0000-0x00000000000F9000-memory.dmp upx behavioral2/files/0x00070000000231ed-6.dat upx behavioral2/memory/396-9-0x0000000000D40000-0x0000000000D59000-memory.dmp upx behavioral2/files/0x0007000000022cdf-12.dat upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" 9893c911c89080f14e015612d75e649b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" CTS.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CTS.exe CTS.exe File created C:\Windows\CTS.exe 9893c911c89080f14e015612d75e649b.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3976 9893c911c89080f14e015612d75e649b.exe Token: SeDebugPrivilege 396 CTS.exe Token: SeBackupPrivilege 4540 dw20.exe Token: SeBackupPrivilege 4540 dw20.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3976 wrote to memory of 3808 3976 9893c911c89080f14e015612d75e649b.exe 84 PID 3976 wrote to memory of 3808 3976 9893c911c89080f14e015612d75e649b.exe 84 PID 3976 wrote to memory of 396 3976 9893c911c89080f14e015612d75e649b.exe 85 PID 3976 wrote to memory of 396 3976 9893c911c89080f14e015612d75e649b.exe 85 PID 3976 wrote to memory of 396 3976 9893c911c89080f14e015612d75e649b.exe 85 PID 3808 wrote to memory of 4540 3808 FzKuBUZ6bwu7wQU.exe 87 PID 3808 wrote to memory of 4540 3808 FzKuBUZ6bwu7wQU.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\9893c911c89080f14e015612d75e649b.exe"C:\Users\Admin\AppData\Local\Temp\9893c911c89080f14e015612d75e649b.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\FzKuBUZ6bwu7wQU.exeC:\Users\Admin\AppData\Local\Temp\FzKuBUZ6bwu7wQU.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 8083⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:4540
-
-
-
C:\Windows\CTS.exe"C:\Windows\CTS.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
488KB
MD5995aab4db42311beb9c2b970f6ce39d2
SHA1fba8c52002ecd17d85769535590644425e1838d0
SHA256fb1ead62c252d52cf574f387c0989ec3a3bd4de5c8f6a0e9df3d1f8ca4fd7a23
SHA51250536acc9f5d8a9cbd36a3a23ca09d13acb76d7f2d4a7786f26d862bf63654b0f4b0020860ef26080fa691b5ac113dc0517607f03e7ff1c18f177842c7c04057
-
Filesize
56KB
MD5e115521ba14b75f53dcdff087ec6898f
SHA187103a892bb514a93d485fba221bacb9da3aae25
SHA25659b284d0ad4c2634938e70fae67d9048bd98422d052fbd745a9b80b5fae7ae29
SHA512ab3d097bcf11bf7327a28124052b210f5fb13b9bfb9b7376cae1ba5c30182a330506935288a7fe06b7e3fdd82b57f5c31638f1c301738342819c772b346fa35a
-
Filesize
165KB
MD5f974405ea3275e8393abd570b36a20cd
SHA1f93348a9a4d1728a9e06d855a1b9bf7c8695802f
SHA256399af04590e8c1b7273e68dc26fe92631bd9d2bf4add2867345f622700f094b7
SHA512df64e0d26867c7303d86aa2d9c9b3c8cd39d5f512f059d1f9f85539fc0a0f2f76726e48634e78895a2819e3295d797a15f05b69929379ec2c060604cdfc584fd