Analysis
-
max time kernel
151s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 18:31
Behavioral task
behavioral1
Sample
b5623703deb59fcba08167d1652a1292.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b5623703deb59fcba08167d1652a1292.exe
Resource
win10v2004-20240226-en
General
-
Target
b5623703deb59fcba08167d1652a1292.exe
-
Size
1.8MB
-
MD5
b5623703deb59fcba08167d1652a1292
-
SHA1
651c7623418dbd454f1f0fe6d687fdcf4c115d0d
-
SHA256
a3e9aed950d1489c6570b52012d287fd5368683905d0b3c28e653b4cbc8ccaac
-
SHA512
31b08d17f0369414e919f910f7b459b08273c2fed882d9f8c7b46a88f25ef06e67280b1f3d26f91ebc2543da8af1caf3530cd9f396859d6eec4e2df25cf9a463
-
SSDEEP
49152:hfbFjU66CSCG7Jf0UXOf6r6vgVlQC73aDB9:NRj96CSjB0UC6r64bQ63aDB9
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2052 5Ift0OA5gFLmonk.exe 1120 CTS.exe 3908 5Ift0OA5gFLmonk.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/4932-0-0x0000000000B20000-0x0000000000B37000-memory.dmp upx behavioral2/memory/1120-11-0x0000000000460000-0x0000000000477000-memory.dmp upx behavioral2/memory/4932-12-0x0000000000B20000-0x0000000000B37000-memory.dmp upx behavioral2/files/0x0008000000023334-10.dat upx behavioral2/files/0x00060000000226b0-22.dat upx behavioral2/memory/1120-127-0x0000000000460000-0x0000000000477000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" b5623703deb59fcba08167d1652a1292.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" CTS.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CTS.exe b5623703deb59fcba08167d1652a1292.exe File created C:\Windows\CTS.exe CTS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4932 b5623703deb59fcba08167d1652a1292.exe Token: SeDebugPrivilege 1120 CTS.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3908 5Ift0OA5gFLmonk.exe 3908 5Ift0OA5gFLmonk.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4932 wrote to memory of 2052 4932 b5623703deb59fcba08167d1652a1292.exe 94 PID 4932 wrote to memory of 2052 4932 b5623703deb59fcba08167d1652a1292.exe 94 PID 4932 wrote to memory of 2052 4932 b5623703deb59fcba08167d1652a1292.exe 94 PID 4932 wrote to memory of 1120 4932 b5623703deb59fcba08167d1652a1292.exe 95 PID 4932 wrote to memory of 1120 4932 b5623703deb59fcba08167d1652a1292.exe 95 PID 4932 wrote to memory of 1120 4932 b5623703deb59fcba08167d1652a1292.exe 95 PID 2052 wrote to memory of 3908 2052 5Ift0OA5gFLmonk.exe 97 PID 2052 wrote to memory of 3908 2052 5Ift0OA5gFLmonk.exe 97 PID 2052 wrote to memory of 3908 2052 5Ift0OA5gFLmonk.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5623703deb59fcba08167d1652a1292.exe"C:\Users\Admin\AppData\Local\Temp\b5623703deb59fcba08167d1652a1292.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\5Ift0OA5gFLmonk.exeC:\Users\Admin\AppData\Local\Temp\5Ift0OA5gFLmonk.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\jds240625625.tmp\5Ift0OA5gFLmonk.exe"C:\Users\Admin\AppData\Local\Temp\jds240625625.tmp\5Ift0OA5gFLmonk.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3908
-
-
-
C:\Windows\CTS.exe"C:\Windows\CTS.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4292 --field-trial-handle=2276,i,1205556100727695622,5044463180471657307,262144 --variations-seed-version /prefetch:81⤵PID:376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
352KB
MD5ae362d5162f8ec53b84fd5e16d0ef8c1
SHA1f47b5a5af5e24fef5144ff97338f91eca1b45355
SHA256a7cab75c4e2a6d466c39c9b4daae3f49b5d4812f86fda654c47e3339cb97b500
SHA512b6f8dbd50a97988f4a6b8b4d9530ef56a43f379aee130437206393d255261c3b4248cc39cc0faa76be8c65ac76bf414192fb60ad0695d42a0e7c6f761444c326
-
Filesize
1.8MB
MD5544e07d620d3108b9b6aa3384d02dea5
SHA19897596f3c4ec39e38ef7f1081783db7693ae0b2
SHA256a8fb1a1473831ac6feb092afd2cbdded2d6a881d3576158fabd89090050b52f8
SHA5123663b9c056447c4491635b5bdcbc6e1a2b67a432b41bab6f479da5c787c48f1067cecafdfb6d9763f9b17b553aa953ae87068ba7f0c1c93facf34db7ac53a64c
-
Filesize
1.7MB
MD5fb562f7e2f53f3746b955c8a3584e4cc
SHA185d303686e45b8216bdedbcbf4eed47a02a91b80
SHA256ecc50d535145db50c196246f0594f83673c5bc7175b69156e5a5dadfe4d62002
SHA5120284170201b0973e345e8ac9d2a1d9034c0e1d2be37a8f2f74da3daa9953049cdd9652f17d359456746dcfc5799c6761571c4ab355c078db4a44af74ca6bc2fd
-
Filesize
1.6MB
MD5109cbe148f827137c3ba62261f01b29b
SHA12cc02b09da46d9e5d0ac1b306a0bbcc12bfe4c12
SHA256394ad6212e4866cc8e6d1834df8f70538dddf09d23dfa65ea204b22c012b541a
SHA512a2dfa03dd290540bcfeda6cfd7d6ed891700742b4323d8c8dbfc4c822386ef1ddfff5cf71b2e5d7be9ec72fb6fc2145ff6ffc440823187d6956d5aa2794c5799
-
Filesize
154KB
MD5a6d9a4402acef5e347796dfe2ee027f0
SHA1adeee0287c832244f42c715d7a47dafebf1a8639
SHA256faa087b6916909e03e91779d1ce652997df7fb34bbbbadfa6b3785b3859aa78f
SHA51244b3e1ab3435f073b9fa485a85cacc7ec1a9536b29a250aa114c9c58ea3efe23fb940f7de81bfbdc98c626c729e0b482f8cf68520d3762b1966721f5f0f70d89
-
Filesize
29KB
MD570aa23c9229741a9b52e5ce388a883ac
SHA1b42683e21e13de3f71db26635954d992ebe7119e
SHA2569d25cc704b1c00c9d17903e25ca35c319663e997cb9da0b116790b639e9688f2
SHA512be604a2ad5ab8a3e5edb8901016a76042ba873c8d05b4ef8eec31241377ec6b2a883b51c6912dc7640581ffa624547db334683975883ae74e62808b5ae9ab0b5