Resubmissions

12/03/2024, 12:19

240312-phjk9age7z 6

12/03/2024, 12:16

240312-pfw4kage5s 3

12/03/2024, 12:15

240312-pe115aad82 3

Analysis

  • max time kernel
    415s
  • max time network
    312s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240221-en
  • resource tags

    arch:x64arch:x86image:win11-20240221-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    12/03/2024, 12:19

General

  • Target

    Cartis-Tweaker-V7.exe

  • Size

    103KB

  • MD5

    7f5ccc3c0ce7a1000e19f00ea0aff3a3

  • SHA1

    72afe8e65be41c275c644da6257876d02b7e6e3e

  • SHA256

    89a33759410c69ad66d98e787f4673272a9ac13c86e3552370a3fadc185c7209

  • SHA512

    a1a7f6d82549c76d83095d8b10d7aecc41f6ac47fa46463a07813a9eda39c6c7b27f19ad546dac9cf4910fe5004d45bbb45066855e869b6f53318db76ac22b23

  • SSDEEP

    1536:n7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfNwqPajmuSOo:77DhdC6kzWypvaQ0FxyNTBfNNPhua

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Runs net.exe
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Cartis-Tweaker-V7.exe
    "C:\Users\Admin\AppData\Local\Temp\Cartis-Tweaker-V7.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4256
    • C:\Windows\system32\cmd.exe
      "C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\4978.tmp\4979.tmp\497A.bat C:\Users\Admin\AppData\Local\Temp\Cartis-Tweaker-V7.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5032
      • C:\Windows\system32\mode.com
        mode con: cols=155
        3⤵
          PID:3908
        • C:\Windows\system32\net.exe
          net session
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3504
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 session
            4⤵
              PID:3792
          • C:\Windows\system32\chcp.com
            chcp 65001
            3⤵
              PID:1532
            • C:\Windows\system32\mode.com
              mode con cols=192
              3⤵
                PID:2532
              • C:\Windows\system32\mode.com
                mode con lines=45
                3⤵
                  PID:632
                • C:\Windows\system32\cscript.exe
                  cscript //nologo C:\Users\Admin\AppData\Local\Temp\message.vbs
                  3⤵
                    PID:3060
              • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
                "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Documents\Opened.docx" /o ""
                1⤵
                • Checks processor information in registry
                • Enumerates system info in registry
                • Suspicious behavior: AddClipboardFormatListener
                • Suspicious use of SetWindowsHookEx
                PID:1132
              • C:\Windows\System32\rundll32.exe
                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                1⤵
                  PID:2828
                • C:\Windows\system32\SearchIndexer.exe
                  C:\Windows\system32\SearchIndexer.exe /Embedding
                  1⤵
                  • Enumerates connected drives
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:980
                  • C:\Windows\System32\SearchProtocolHost.exe
                    "C:\Windows\System32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
                    2⤵
                    • Modifies data under HKEY_USERS
                    PID:3376
                  • C:\Windows\System32\SearchProtocolHost.exe
                    "C:\Windows\System32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe_S-1-5-21-3852399462-405385529-394778097-10002_ Global\UsGthrCtrlFltPipeMssGthrPipe_S-1-5-21-3852399462-405385529-394778097-10002 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" "1"
                    2⤵
                      PID:4268
                    • C:\Windows\system32\SearchFilterHost.exe
                      "C:\Windows\system32\SearchFilterHost.exe" 828 2712 2696 816 {85EE815A-7738-4808-A14A-3AD87E32A3BF}
                      2⤵
                      • Modifies data under HKEY_USERS
                      PID:3060
                    • C:\Windows\system32\SearchFilterHost.exe
                      "C:\Windows\system32\SearchFilterHost.exe" 828 2672 2668 816 {0E5DCEC5-7795-4E38-9621-94DFD9F9A421}
                      2⤵
                      • Modifies data under HKEY_USERS
                      PID:4916
                  • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
                    "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
                    1⤵
                    • Suspicious use of SetWindowsHookEx
                    PID:2476
                  • C:\Users\Admin\AppData\Local\Temp\Cartis-Tweaker-V7.exe
                    "C:\Users\Admin\AppData\Local\Temp\Cartis-Tweaker-V7.exe"
                    1⤵
                      PID:4080
                    • C:\Users\Admin\AppData\Local\Temp\Cartis-Tweaker-V7.exe
                      "C:\Users\Admin\AppData\Local\Temp\Cartis-Tweaker-V7.exe"
                      1⤵
                      • Suspicious use of WriteProcessMemory
                      PID:4116
                      • C:\Windows\system32\cmd.exe
                        "C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\70DD.tmp\70DE.tmp\70DF.bat C:\Users\Admin\AppData\Local\Temp\Cartis-Tweaker-V7.exe"
                        2⤵
                        • Suspicious use of WriteProcessMemory
                        PID:1340
                        • C:\Windows\system32\mode.com
                          mode con: cols=155
                          3⤵
                            PID:2576
                          • C:\Windows\system32\net.exe
                            net session
                            3⤵
                            • Suspicious use of WriteProcessMemory
                            PID:1556
                            • C:\Windows\system32\net1.exe
                              C:\Windows\system32\net1 session
                              4⤵
                                PID:4176
                            • C:\Windows\system32\chcp.com
                              chcp 65001
                              3⤵
                                PID:4476
                              • C:\Windows\system32\mode.com
                                mode con cols=192
                                3⤵
                                  PID:1408
                                • C:\Windows\system32\mode.com
                                  mode con lines=45
                                  3⤵
                                    PID:3936
                                  • C:\Windows\system32\cscript.exe
                                    cscript //nologo C:\Users\Admin\AppData\Local\Temp\message.vbs
                                    3⤵
                                      PID:3868

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Temp\4978.tmp\4979.tmp\497A.bat

                                  Filesize

                                  7KB

                                  MD5

                                  0c3a00da899e8955f22607eaa28d6289

                                  SHA1

                                  acb0b64951d0fa8a0adf169efd578abe4ee7205c

                                  SHA256

                                  96a62e3c175bd2c003ff0bc162030ae707ad81b8e899baf7401b734a30a68d4d

                                  SHA512

                                  38b9bce5c2657c33cf8fa91bc40ab139d016dfb7a6336009b592d6e5074f78b5003fde64a90a076642ec5d1e6f4b78be5ee26d964667f589b559b802ba3147f3

                                • C:\Users\Admin\AppData\Local\Temp\message.vbs

                                  Filesize

                                  122B

                                  MD5

                                  b8904b2fe2b46f5af90cb6521892e34e

                                  SHA1

                                  bf200daf548f3ec60bfac0e435174c9606cefaac

                                  SHA256

                                  ba2bb863679cd17e175e4fe87603c8512859d927636fd85b4fe948018a751dfe

                                  SHA512

                                  742c7f8d1c778e17294d2384f11f87f2956f89fec375263cc379d8cae1583e5b8e81ad59190011320e3b4bb466f7513d57846a257d45946e1c3bb7f094318c57

                                • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

                                  Filesize

                                  202B

                                  MD5

                                  dd0c1d22223d8d0e4e271a25a6576eb5

                                  SHA1

                                  24db1209d718bd8eb443da6eec2ee28d39aaecd8

                                  SHA256

                                  c5b636a315f8af0aac9068a2517dbb1fe136a77b9baefd12af102e65b28a13e2

                                  SHA512

                                  fe7568b22218c10b268c115f2209ffa8282777e354a9ce0980857879c0364f005fb6af69627e95286a8229191d34e97479498986c657c6d4a394e54731653195

                                • memory/980-102-0x000001BA8F230000-0x000001BA8F238000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/980-104-0x000001BA8F270000-0x000001BA8F278000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/980-105-0x000001BA8F230000-0x000001BA8F231000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/980-99-0x000001BA8E730000-0x000001BA8E738000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/980-107-0x000001BA8F270000-0x000001BA8F278000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/980-94-0x000001BA8D9F0000-0x000001BA8D9F8000-memory.dmp

                                  Filesize

                                  32KB

                                • memory/980-78-0x000001BA89630000-0x000001BA89640000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/980-62-0x000001BA89400000-0x000001BA89410000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/980-108-0x000001BA8F230000-0x000001BA8F231000-memory.dmp

                                  Filesize

                                  4KB

                                • memory/1132-20-0x00007FFC0D400000-0x00007FFC0D4BD000-memory.dmp

                                  Filesize

                                  756KB

                                • memory/1132-16-0x00007FFC0DEA0000-0x00007FFC0E0A9000-memory.dmp

                                  Filesize

                                  2.0MB

                                • memory/1132-18-0x00007FFC0DEA0000-0x00007FFC0E0A9000-memory.dmp

                                  Filesize

                                  2.0MB

                                • memory/1132-21-0x00007FFBCB390000-0x00007FFBCB3A0000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/1132-17-0x00007FFC0DEA0000-0x00007FFC0E0A9000-memory.dmp

                                  Filesize

                                  2.0MB

                                • memory/1132-22-0x00007FFC0D400000-0x00007FFC0D4BD000-memory.dmp

                                  Filesize

                                  756KB

                                • memory/1132-19-0x00007FFC0DEA0000-0x00007FFC0E0A9000-memory.dmp

                                  Filesize

                                  2.0MB

                                • memory/1132-23-0x00007FFBCB390000-0x00007FFBCB3A0000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/1132-15-0x00007FFC0DEA0000-0x00007FFC0E0A9000-memory.dmp

                                  Filesize

                                  2.0MB

                                • memory/1132-56-0x00007FFBCDF30000-0x00007FFBCDF40000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/1132-57-0x00007FFBCDF30000-0x00007FFBCDF40000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/1132-58-0x00007FFBCDF30000-0x00007FFBCDF40000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/1132-59-0x00007FFBCDF30000-0x00007FFBCDF40000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/1132-60-0x00007FFC0DEA0000-0x00007FFC0E0A9000-memory.dmp

                                  Filesize

                                  2.0MB

                                • memory/1132-61-0x00007FFC0D400000-0x00007FFC0D4BD000-memory.dmp

                                  Filesize

                                  756KB

                                • memory/1132-7-0x00007FFC0DEA0000-0x00007FFC0E0A9000-memory.dmp

                                  Filesize

                                  2.0MB

                                • memory/1132-9-0x00007FFC0DEA0000-0x00007FFC0E0A9000-memory.dmp

                                  Filesize

                                  2.0MB

                                • memory/1132-14-0x00007FFC0DEA0000-0x00007FFC0E0A9000-memory.dmp

                                  Filesize

                                  2.0MB

                                • memory/1132-13-0x00007FFC0DEA0000-0x00007FFC0E0A9000-memory.dmp

                                  Filesize

                                  2.0MB

                                • memory/1132-12-0x00007FFBCDF30000-0x00007FFBCDF40000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/1132-11-0x00007FFC0DEA0000-0x00007FFC0E0A9000-memory.dmp

                                  Filesize

                                  2.0MB

                                • memory/1132-10-0x00007FFBCDF30000-0x00007FFBCDF40000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/1132-8-0x00007FFBCDF30000-0x00007FFBCDF40000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/1132-6-0x00007FFBCDF30000-0x00007FFBCDF40000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/1132-5-0x00007FFBCDF30000-0x00007FFBCDF40000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4916-112-0x0000028CF8070000-0x0000028CF8080000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4916-137-0x0000028CF8070000-0x0000028CF8080000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4916-115-0x0000028CF8070000-0x0000028CF8080000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4916-113-0x0000028CF8070000-0x0000028CF8080000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4916-110-0x0000028CF8070000-0x0000028CF8080000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4916-116-0x0000028CF8070000-0x0000028CF8080000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4916-117-0x0000028CF8070000-0x0000028CF8080000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4916-118-0x0000028CF8070000-0x0000028CF8080000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4916-120-0x0000028CF8070000-0x0000028CF8080000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4916-122-0x0000028CF8070000-0x0000028CF8080000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4916-121-0x0000028CF8070000-0x0000028CF8080000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4916-123-0x0000028CF8070000-0x0000028CF8080000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4916-124-0x0000028CF8070000-0x0000028CF8080000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4916-119-0x0000028CF8070000-0x0000028CF8080000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4916-128-0x0000028CF8070000-0x0000028CF8080000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4916-131-0x0000028CF8070000-0x0000028CF8080000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4916-136-0x0000028CF8070000-0x0000028CF8080000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4916-111-0x0000028CF8070000-0x0000028CF8080000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4916-146-0x0000028CF8070000-0x0000028CF8080000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4916-148-0x0000028CF8070000-0x0000028CF8080000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4916-150-0x0000028CF8070000-0x0000028CF8080000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4916-154-0x0000028CF8070000-0x0000028CF8080000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4916-156-0x0000028CF8070000-0x0000028CF8080000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4916-161-0x0000028CF8070000-0x0000028CF8080000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4916-169-0x0000028CFA500000-0x0000028CFA510000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4916-168-0x0000028CF8070000-0x0000028CF8080000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4916-173-0x0000028CF8070000-0x0000028CF8080000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4916-175-0x0000028CF8070000-0x0000028CF8080000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4916-182-0x0000028CF8070000-0x0000028CF8080000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4916-189-0x0000028CF8070000-0x0000028CF8080000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4916-191-0x0000028CF8070000-0x0000028CF8080000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4916-193-0x0000028CF8070000-0x0000028CF8080000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/4916-196-0x0000028CF8070000-0x0000028CF8080000-memory.dmp

                                  Filesize

                                  64KB