Analysis

  • max time kernel
    151s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/03/2024, 18:31

General

  • Target

    b5623703deb59fcba08167d1652a1292.exe

  • Size

    1.8MB

  • MD5

    b5623703deb59fcba08167d1652a1292

  • SHA1

    651c7623418dbd454f1f0fe6d687fdcf4c115d0d

  • SHA256

    a3e9aed950d1489c6570b52012d287fd5368683905d0b3c28e653b4cbc8ccaac

  • SHA512

    31b08d17f0369414e919f910f7b459b08273c2fed882d9f8c7b46a88f25ef06e67280b1f3d26f91ebc2543da8af1caf3530cd9f396859d6eec4e2df25cf9a463

  • SSDEEP

    49152:hfbFjU66CSCG7Jf0UXOf6r6vgVlQC73aDB9:NRj96CSjB0UC6r64bQ63aDB9

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b5623703deb59fcba08167d1652a1292.exe
    "C:\Users\Admin\AppData\Local\Temp\b5623703deb59fcba08167d1652a1292.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4932
    • C:\Users\Admin\AppData\Local\Temp\5Ift0OA5gFLmonk.exe
      C:\Users\Admin\AppData\Local\Temp\5Ift0OA5gFLmonk.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2052
      • C:\Users\Admin\AppData\Local\Temp\jds240625625.tmp\5Ift0OA5gFLmonk.exe
        "C:\Users\Admin\AppData\Local\Temp\jds240625625.tmp\5Ift0OA5gFLmonk.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:3908
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:1120
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4292 --field-trial-handle=2276,i,1205556100727695622,5044463180471657307,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:376

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

      Filesize

      352KB

      MD5

      ae362d5162f8ec53b84fd5e16d0ef8c1

      SHA1

      f47b5a5af5e24fef5144ff97338f91eca1b45355

      SHA256

      a7cab75c4e2a6d466c39c9b4daae3f49b5d4812f86fda654c47e3339cb97b500

      SHA512

      b6f8dbd50a97988f4a6b8b4d9530ef56a43f379aee130437206393d255261c3b4248cc39cc0faa76be8c65ac76bf414192fb60ad0695d42a0e7c6f761444c326

    • C:\Users\Admin\AppData\Local\Temp\5Ift0OA5gFLmonk.exe

      Filesize

      1.8MB

      MD5

      544e07d620d3108b9b6aa3384d02dea5

      SHA1

      9897596f3c4ec39e38ef7f1081783db7693ae0b2

      SHA256

      a8fb1a1473831ac6feb092afd2cbdded2d6a881d3576158fabd89090050b52f8

      SHA512

      3663b9c056447c4491635b5bdcbc6e1a2b67a432b41bab6f479da5c787c48f1067cecafdfb6d9763f9b17b553aa953ae87068ba7f0c1c93facf34db7ac53a64c

    • C:\Users\Admin\AppData\Local\Temp\5Ift0OA5gFLmonk.exe

      Filesize

      1.7MB

      MD5

      fb562f7e2f53f3746b955c8a3584e4cc

      SHA1

      85d303686e45b8216bdedbcbf4eed47a02a91b80

      SHA256

      ecc50d535145db50c196246f0594f83673c5bc7175b69156e5a5dadfe4d62002

      SHA512

      0284170201b0973e345e8ac9d2a1d9034c0e1d2be37a8f2f74da3daa9953049cdd9652f17d359456746dcfc5799c6761571c4ab355c078db4a44af74ca6bc2fd

    • C:\Users\Admin\AppData\Local\Temp\jds240625625.tmp\5Ift0OA5gFLmonk.exe

      Filesize

      1.6MB

      MD5

      109cbe148f827137c3ba62261f01b29b

      SHA1

      2cc02b09da46d9e5d0ac1b306a0bbcc12bfe4c12

      SHA256

      394ad6212e4866cc8e6d1834df8f70538dddf09d23dfa65ea204b22c012b541a

      SHA512

      a2dfa03dd290540bcfeda6cfd7d6ed891700742b4323d8c8dbfc4c822386ef1ddfff5cf71b2e5d7be9ec72fb6fc2145ff6ffc440823187d6956d5aa2794c5799

    • C:\Users\Admin\AppData\Local\Temp\jusched.log

      Filesize

      154KB

      MD5

      a6d9a4402acef5e347796dfe2ee027f0

      SHA1

      adeee0287c832244f42c715d7a47dafebf1a8639

      SHA256

      faa087b6916909e03e91779d1ce652997df7fb34bbbbadfa6b3785b3859aa78f

      SHA512

      44b3e1ab3435f073b9fa485a85cacc7ec1a9536b29a250aa114c9c58ea3efe23fb940f7de81bfbdc98c626c729e0b482f8cf68520d3762b1966721f5f0f70d89

    • C:\Windows\CTS.exe

      Filesize

      29KB

      MD5

      70aa23c9229741a9b52e5ce388a883ac

      SHA1

      b42683e21e13de3f71db26635954d992ebe7119e

      SHA256

      9d25cc704b1c00c9d17903e25ca35c319663e997cb9da0b116790b639e9688f2

      SHA512

      be604a2ad5ab8a3e5edb8901016a76042ba873c8d05b4ef8eec31241377ec6b2a883b51c6912dc7640581ffa624547db334683975883ae74e62808b5ae9ab0b5

    • memory/1120-11-0x0000000000460000-0x0000000000477000-memory.dmp

      Filesize

      92KB

    • memory/1120-127-0x0000000000460000-0x0000000000477000-memory.dmp

      Filesize

      92KB

    • memory/4932-0-0x0000000000B20000-0x0000000000B37000-memory.dmp

      Filesize

      92KB

    • memory/4932-12-0x0000000000B20000-0x0000000000B37000-memory.dmp

      Filesize

      92KB