Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2024, 16:02
Static task
static1
Behavioral task
behavioral1
Sample
ctmon.exe
Resource
win10v2004-20240221-en
General
-
Target
ctmon.exe
-
Size
5.2MB
-
MD5
d7ca45659894912607bfb4e3c969379a
-
SHA1
c930fe71cee79cadddb5330ab15e107f5551643c
-
SHA256
514800ca5b5162ad8aab542f41654a2c7b3790537543691313bb74addd351176
-
SHA512
eb2ccbbb7b2dec1bdf1fe3d9826f9a67d6b024e48acfd8f451269c837b08d51f7450aa5e440c0c5bda7e1a371a2a279403c34a5179c13bac5924d6c4906188f1
-
SSDEEP
98304:nrAdIvTJvpwfDtnPfTkiHEixVHShWQq7Sx+wl5lHbTisC7oish2Z:rdTM7tnPfTyiGq7lmHrqsh2Z
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
description pid Process procid_target PID 3528 created 3244 3528 ctmon.exe 50 PID 3528 created 3244 3528 ctmon.exe 50 PID 3528 created 3244 3528 ctmon.exe 50 PID 3528 created 3244 3528 ctmon.exe 50 -
Executes dropped EXE 1 IoCs
pid Process 3312 ctmon.exe -
Registers new Windows logon scripts automatically executed at logon. 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3054445511-921769590-4013668107-1000\Environment\UserInitMprLogonScript = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Internet Explorer\\ctmon.exe" reg.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3528 ctmon.exe 3528 ctmon.exe 3528 ctmon.exe 3528 ctmon.exe 3528 ctmon.exe 3528 ctmon.exe 3528 ctmon.exe 3528 ctmon.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 2660 powercfg.exe Token: SeCreatePagefilePrivilege 2660 powercfg.exe Token: SeShutdownPrivilege 3564 powercfg.exe Token: SeCreatePagefilePrivilege 3564 powercfg.exe Token: SeShutdownPrivilege 1240 powercfg.exe Token: SeCreatePagefilePrivilege 1240 powercfg.exe Token: SeShutdownPrivilege 4892 powercfg.exe Token: SeCreatePagefilePrivilege 4892 powercfg.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3740 wrote to memory of 2660 3740 cmd.exe 94 PID 3740 wrote to memory of 2660 3740 cmd.exe 94 PID 3740 wrote to memory of 3564 3740 cmd.exe 97 PID 3740 wrote to memory of 3564 3740 cmd.exe 97 PID 3740 wrote to memory of 1240 3740 cmd.exe 99 PID 3740 wrote to memory of 1240 3740 cmd.exe 99 PID 3740 wrote to memory of 4892 3740 cmd.exe 100 PID 3740 wrote to memory of 4892 3740 cmd.exe 100
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3244
-
C:\Users\Admin\AppData\Local\Temp\ctmon.exe"C:\Users\Admin\AppData\Local\Temp\ctmon.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
PID:3528
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2660
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:3564
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1240
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4892
-
-
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe delete "HKCU\Environment" /v "UserInitMprLogonScript" /f2⤵PID:2784
-
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe add "HKCU\Environment" /v "UserInitMprLogonScript" /t REG_SZ /f /d "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\ctmon.exe"2⤵
- Registers new Windows logon scripts automatically executed at logon.
PID:484
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\ctmon.exeC:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\ctmon.exe2⤵
- Executes dropped EXE
PID:3312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.2MB
MD5d7ca45659894912607bfb4e3c969379a
SHA1c930fe71cee79cadddb5330ab15e107f5551643c
SHA256514800ca5b5162ad8aab542f41654a2c7b3790537543691313bb74addd351176
SHA512eb2ccbbb7b2dec1bdf1fe3d9826f9a67d6b024e48acfd8f451269c837b08d51f7450aa5e440c0c5bda7e1a371a2a279403c34a5179c13bac5924d6c4906188f1