Analysis

  • max time kernel
    142s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/03/2024, 17:23

General

  • Target

    c6735fec5076fe37fc3cf6090b449ed6.exe

  • Size

    83KB

  • MD5

    c6735fec5076fe37fc3cf6090b449ed6

  • SHA1

    c8be76b9130207855a6cf8dcd08d1b402c11918b

  • SHA256

    5e38f9d9695745ac128e898ae7bfb59675a0c031bfc1637354d192b9e2840c2d

  • SHA512

    5d7ec4a9c049cb8aa4a3740cd0aa7f8a9c1faead4a433fcb1b41583c03f95b52f030a6afc760401601e94ce8c9c16fd3468003257b82c55e6f1b5bd0fd14bd48

  • SSDEEP

    768:XCNK2cNW0QbRsWjcd+6yBFLqJ4Z8qx70RM8/O/B2ZR1RGn8NIoGLLRNeoPZ:UcNjQlsWjcd+xzl7SM+Gn8255Neoh

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c6735fec5076fe37fc3cf6090b449ed6.exe
    "C:\Users\Admin\AppData\Local\Temp\c6735fec5076fe37fc3cf6090b449ed6.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:988
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:1740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

    Filesize

    405KB

    MD5

    b7fb60655be143314313a2c98c72cfc8

    SHA1

    8c1cecc1526e6392883eb496adeb20ec0eae5346

    SHA256

    c47c63d773957ab07f59cc523c6f791971928500aca35b7a6885ce4306351950

    SHA512

    2263adf46ce856574d45ac6ede0fb1f688501252019947d7108d28d04f03f0818b4dec63ee744ed7d4cd832c8c005d4bd6233711deb66e6067cfd41d8da90042

  • C:\Users\Admin\AppData\Local\Temp\hJforn7Q3oVaJFa.exe

    Filesize

    83KB

    MD5

    ae39703d44b0744c51f95cf098578e4b

    SHA1

    69906cb2ac7a2a70a3c9bcb416336496e4ad8450

    SHA256

    8eb800c6538e5ddb13e4d4f52d9b1c979449ff4705b4a9fb8d311c84327e2e04

    SHA512

    ac4c52e5ed11282180702a5730a108740c3fd66523b906bfb9b0d817f8ebfff323ee7a31c9e96e7c86480dd12d35bfa19b8bddcbf1126f05396d8300f05c03ff

  • C:\Windows\CTS.exe

    Filesize

    82KB

    MD5

    546ffd2b72777e6a9e350780b79f99d4

    SHA1

    a620be74a2f432656e38e51cd02fbdc3e3b312c2

    SHA256

    c651b378896fad56ddeb1fec2c578a822bbb13269ec881f9420bbf47c9fbfbb5

    SHA512

    57d49f830f9774ef0a4b6d026211360ea4ebcc6b236b72107401284559c7c589733bccc8af10c5a0cee5b97880d24a4e9954beb81887b1b124f8a42cca456fac

  • memory/988-0-0x0000000000CD0000-0x0000000000CE9000-memory.dmp

    Filesize

    100KB

  • memory/988-8-0x0000000000CD0000-0x0000000000CE9000-memory.dmp

    Filesize

    100KB

  • memory/1740-9-0x00000000004B0000-0x00000000004C9000-memory.dmp

    Filesize

    100KB