Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/02/2024, 18:44
Behavioral task
behavioral1
Sample
a9e26a99a7784c1988413107f3ff42d8.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a9e26a99a7784c1988413107f3ff42d8.exe
Resource
win10v2004-20240226-en
General
-
Target
a9e26a99a7784c1988413107f3ff42d8.exe
-
Size
59KB
-
MD5
a9e26a99a7784c1988413107f3ff42d8
-
SHA1
5012ae45b4be77386b0b10db196ac6079f5d912b
-
SHA256
2f1cee0a88e185c31a13dd6b46966c004bf7def05c9824cd986a887866841e8f
-
SHA512
a823769abe546346162c88cfbdd7bafe854d6952a55db3fe57810d4f9be9c40ef84f77337a9c8bc5fbf07a5cb8f8ec4541124f385907340b3418772928206ab5
-
SSDEEP
768:XocAX3LKew369lp2z3Sd4baFXLjwP/Tgj93b8NIocVSEFGocAX3LKew369lp2z3h:SKcR4mjD9r823FHKcR4mjD9r823FK
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3996 CTS.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/1624-0-0x0000000000230000-0x0000000000247000-memory.dmp upx behavioral2/files/0x000a0000000231aa-6.dat upx behavioral2/memory/3996-9-0x0000000000720000-0x0000000000737000-memory.dmp upx behavioral2/memory/1624-7-0x0000000000230000-0x0000000000247000-memory.dmp upx behavioral2/files/0x000600000002275e-12.dat upx behavioral2/files/0x000400000001e980-30.dat upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" CTS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" a9e26a99a7784c1988413107f3ff42d8.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CTS.exe a9e26a99a7784c1988413107f3ff42d8.exe File created C:\Windows\CTS.exe CTS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1624 a9e26a99a7784c1988413107f3ff42d8.exe Token: SeDebugPrivilege 3996 CTS.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1624 wrote to memory of 3996 1624 a9e26a99a7784c1988413107f3ff42d8.exe 90 PID 1624 wrote to memory of 3996 1624 a9e26a99a7784c1988413107f3ff42d8.exe 90 PID 1624 wrote to memory of 3996 1624 a9e26a99a7784c1988413107f3ff42d8.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9e26a99a7784c1988413107f3ff42d8.exe"C:\Users\Admin\AppData\Local\Temp\a9e26a99a7784c1988413107f3ff42d8.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\CTS.exe"C:\Windows\CTS.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD51193c285ec2a352b0505747665482fcb
SHA1f9b01acf8014f56e43e07e98007b3184a91c6c24
SHA2562894c71d9210a8d985abbfd0ccf35208a9d44b00c9982bd21cf3e11f1778da33
SHA5127127a583bbefbee5ecae06e53c482559aee4bdad870dd41b6fe69399260fa5151b517106beb8e05ab2736d1ed3c2865ca49ec285700c8ebb189324f112ed246f
-
Filesize
59KB
MD5dd9dd010865528870a2091753d5815ea
SHA12ec78a00070bc2192aa8b3cf50b279e9e3da3665
SHA256b824c9bc532411a3114fc639f867b513a05887b8841e65123a4990423f5db534
SHA5129e05849a72ea9e919aa838beb5bf926f92640e3ec68ac154a96406662761a4412f942a7526b995879c12cd26c865ecdb1fe3b1620087341b6c659b18a0beb4b9
-
Filesize
59KB
MD55efd390d5f95c8191f5ac33c4db4b143
SHA142d81b118815361daa3007f1a40f1576e9a9e0bc
SHA2566028434636f349d801465f77af3a1e387a9c5032942ca6cadb6506d0800f2a74
SHA512720fbe253483dc034307a57a2860c8629a760f883603198d1213f5290b7f236bf0f5f237728ebed50962be83dc7dc4abe61a1e9a55218778495fc6580eb20b3d