Analysis
-
max time kernel
158s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 16:56
Behavioral task
behavioral1
Sample
b7e7e5d27549a3b2a966154c7a6da670.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b7e7e5d27549a3b2a966154c7a6da670.exe
Resource
win10v2004-20240226-en
General
-
Target
b7e7e5d27549a3b2a966154c7a6da670.exe
-
Size
59KB
-
MD5
b7e7e5d27549a3b2a966154c7a6da670
-
SHA1
bd5d184f039569d31f9f733e20a805e680095480
-
SHA256
3aed9bd2be64895be6b613ad86bb875511fb41ade9fd4479c6225c8b61da49a8
-
SHA512
25466ba625eafb9a18aa7bc7fc67d4c3e1dc60ed03893299fe40febc14eae45a04526de3f2a1508b3cf85db6c53c9d190a89c99ab98b8a0e6f13c02294962c35
-
SSDEEP
768:XocAX3LKew369lp2z3Sd4baFXLjwP/Tgj93b8NIocVSEFGocAX3LKew369lp2z3I:SKcR4mjD9r823FHKcR4mjD9r823Fp5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1988 CTS.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/2600-0-0x00000000006D0000-0x00000000006E7000-memory.dmp upx behavioral2/files/0x0007000000023212-6.dat upx behavioral2/memory/2600-8-0x00000000006D0000-0x00000000006E7000-memory.dmp upx behavioral2/memory/1988-7-0x0000000000410000-0x0000000000427000-memory.dmp upx behavioral2/files/0x000400000001e807-12.dat upx behavioral2/memory/1988-16-0x0000000000410000-0x0000000000427000-memory.dmp upx behavioral2/files/0x00050000000224ff-31.dat upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" b7e7e5d27549a3b2a966154c7a6da670.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" CTS.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CTS.exe b7e7e5d27549a3b2a966154c7a6da670.exe File created C:\Windows\CTS.exe CTS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2600 b7e7e5d27549a3b2a966154c7a6da670.exe Token: SeDebugPrivilege 1988 CTS.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2600 wrote to memory of 1988 2600 b7e7e5d27549a3b2a966154c7a6da670.exe 87 PID 2600 wrote to memory of 1988 2600 b7e7e5d27549a3b2a966154c7a6da670.exe 87 PID 2600 wrote to memory of 1988 2600 b7e7e5d27549a3b2a966154c7a6da670.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7e7e5d27549a3b2a966154c7a6da670.exe"C:\Users\Admin\AppData\Local\Temp\b7e7e5d27549a3b2a966154c7a6da670.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\CTS.exe"C:\Windows\CTS.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
382KB
MD51ed053ce78871dfdbdfb36a16aa0838e
SHA15223c1dcb5799cd11090e62de0507a0f693d9b66
SHA256c6aade2433e679297d52ca73cc5543d51aaa948c258ceffca5864122c52b8f9f
SHA51235556174b468063c45c55f29214f43cfd538451359525c49ddcab467b12c82ffcbb00343cdf041efafb650db17d8642dcf87bf9bfedd57ec6dfd00aa3a87e409
-
Filesize
59KB
MD5960e78fbd79bb9af4808a7c80a44bd61
SHA107355b1cdab141983ce97ef7049800915aa7b555
SHA256814489c9ffca562e3b9bda68057fd1d776150f3abd048cc20f692408fe2c1c12
SHA5127e74510ddf4a2d6985d2a2e06698f049fcce902f5b8a59d521ffbb56d43178f186e2a09c5828054acec0335b9f90fd7a7f5adc12c7162c390a97eadab33326dd
-
Filesize
59KB
MD55efd390d5f95c8191f5ac33c4db4b143
SHA142d81b118815361daa3007f1a40f1576e9a9e0bc
SHA2566028434636f349d801465f77af3a1e387a9c5032942ca6cadb6506d0800f2a74
SHA512720fbe253483dc034307a57a2860c8629a760f883603198d1213f5290b7f236bf0f5f237728ebed50962be83dc7dc4abe61a1e9a55218778495fc6580eb20b3d