Analysis
-
max time kernel
41s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2024, 16:09
Static task
static1
Behavioral task
behavioral1
Sample
ctmon.exe
Resource
win10v2004-20240221-en
General
-
Target
ctmon.exe
-
Size
5.2MB
-
MD5
d7ca45659894912607bfb4e3c969379a
-
SHA1
c930fe71cee79cadddb5330ab15e107f5551643c
-
SHA256
514800ca5b5162ad8aab542f41654a2c7b3790537543691313bb74addd351176
-
SHA512
eb2ccbbb7b2dec1bdf1fe3d9826f9a67d6b024e48acfd8f451269c837b08d51f7450aa5e440c0c5bda7e1a371a2a279403c34a5179c13bac5924d6c4906188f1
-
SSDEEP
98304:nrAdIvTJvpwfDtnPfTkiHEixVHShWQq7Sx+wl5lHbTisC7oish2Z:rdTM7tnPfTyiGq7lmHrqsh2Z
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
description pid Process procid_target PID 3340 created 3284 3340 ctmon.exe 33 PID 3340 created 3284 3340 ctmon.exe 33 PID 3340 created 3284 3340 ctmon.exe 33 PID 3340 created 3284 3340 ctmon.exe 33 -
Executes dropped EXE 1 IoCs
pid Process 4356 ctmon.exe -
Registers new Windows logon scripts automatically executed at logon. 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000\Environment\UserInitMprLogonScript = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Internet Explorer\\ctmon.exe" reg.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3340 ctmon.exe 3340 ctmon.exe 3340 ctmon.exe 3340 ctmon.exe 3340 ctmon.exe 3340 ctmon.exe 3340 ctmon.exe 3340 ctmon.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 5028 powercfg.exe Token: SeCreatePagefilePrivilege 5028 powercfg.exe Token: SeShutdownPrivilege 4720 powercfg.exe Token: SeCreatePagefilePrivilege 4720 powercfg.exe Token: SeShutdownPrivilege 4648 powercfg.exe Token: SeCreatePagefilePrivilege 4648 powercfg.exe Token: SeShutdownPrivilege 3144 powercfg.exe Token: SeCreatePagefilePrivilege 3144 powercfg.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2356 wrote to memory of 5028 2356 cmd.exe 95 PID 2356 wrote to memory of 5028 2356 cmd.exe 95 PID 2356 wrote to memory of 4720 2356 cmd.exe 98 PID 2356 wrote to memory of 4720 2356 cmd.exe 98 PID 2356 wrote to memory of 4648 2356 cmd.exe 100 PID 2356 wrote to memory of 4648 2356 cmd.exe 100 PID 2356 wrote to memory of 3144 2356 cmd.exe 101 PID 2356 wrote to memory of 3144 2356 cmd.exe 101
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\ctmon.exe"C:\Users\Admin\AppData\Local\Temp\ctmon.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Suspicious behavior: EnumeratesProcesses
PID:3340
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:5028
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4720
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4648
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:3144
-
-
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe delete "HKCU\Environment" /v "UserInitMprLogonScript" /f2⤵PID:4452
-
-
C:\Windows\System32\reg.exeC:\Windows\System32\reg.exe add "HKCU\Environment" /v "UserInitMprLogonScript" /t REG_SZ /f /d "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\ctmon.exe"2⤵
- Registers new Windows logon scripts automatically executed at logon.
PID:32
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\ctmon.exeC:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\ctmon.exe2⤵
- Executes dropped EXE
PID:4356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD55ce9e86a73f660734ca946c233d154dc
SHA1075539daa4e93163e3076fcedfb3ecef35a9080d
SHA256c327d34c1ced0690e786461caee5c48da75b7f4fca6c128dded9fbf89adf4eb3
SHA512d75f8d8199f4e121c41f7d302b402673c7d6842d22aea154a4fd96c682ed84adbb6837d532127a201d09463daa9bf3a0a4fe7b27019835053f0e26292801cf40