Analysis
-
max time kernel
142s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 17:23
Behavioral task
behavioral1
Sample
c6735fec5076fe37fc3cf6090b449ed6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c6735fec5076fe37fc3cf6090b449ed6.exe
Resource
win10v2004-20240226-en
General
-
Target
c6735fec5076fe37fc3cf6090b449ed6.exe
-
Size
83KB
-
MD5
c6735fec5076fe37fc3cf6090b449ed6
-
SHA1
c8be76b9130207855a6cf8dcd08d1b402c11918b
-
SHA256
5e38f9d9695745ac128e898ae7bfb59675a0c031bfc1637354d192b9e2840c2d
-
SHA512
5d7ec4a9c049cb8aa4a3740cd0aa7f8a9c1faead4a433fcb1b41583c03f95b52f030a6afc760401601e94ce8c9c16fd3468003257b82c55e6f1b5bd0fd14bd48
-
SSDEEP
768:XCNK2cNW0QbRsWjcd+6yBFLqJ4Z8qx70RM8/O/B2ZR1RGn8NIoGLLRNeoPZ:UcNjQlsWjcd+xzl7SM+Gn8255Neoh
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1740 CTS.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/988-0-0x0000000000CD0000-0x0000000000CE9000-memory.dmp upx behavioral2/files/0x000800000002320c-7.dat upx behavioral2/memory/1740-9-0x00000000004B0000-0x00000000004C9000-memory.dmp upx behavioral2/memory/988-8-0x0000000000CD0000-0x0000000000CE9000-memory.dmp upx behavioral2/files/0x00020000000227b4-12.dat upx behavioral2/files/0x000700000001e59e-30.dat upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" c6735fec5076fe37fc3cf6090b449ed6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" CTS.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CTS.exe c6735fec5076fe37fc3cf6090b449ed6.exe File created C:\Windows\CTS.exe CTS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 988 c6735fec5076fe37fc3cf6090b449ed6.exe Token: SeDebugPrivilege 1740 CTS.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 988 wrote to memory of 1740 988 c6735fec5076fe37fc3cf6090b449ed6.exe 89 PID 988 wrote to memory of 1740 988 c6735fec5076fe37fc3cf6090b449ed6.exe 89 PID 988 wrote to memory of 1740 988 c6735fec5076fe37fc3cf6090b449ed6.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6735fec5076fe37fc3cf6090b449ed6.exe"C:\Users\Admin\AppData\Local\Temp\c6735fec5076fe37fc3cf6090b449ed6.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\CTS.exe"C:\Windows\CTS.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
405KB
MD5b7fb60655be143314313a2c98c72cfc8
SHA18c1cecc1526e6392883eb496adeb20ec0eae5346
SHA256c47c63d773957ab07f59cc523c6f791971928500aca35b7a6885ce4306351950
SHA5122263adf46ce856574d45ac6ede0fb1f688501252019947d7108d28d04f03f0818b4dec63ee744ed7d4cd832c8c005d4bd6233711deb66e6067cfd41d8da90042
-
Filesize
83KB
MD5ae39703d44b0744c51f95cf098578e4b
SHA169906cb2ac7a2a70a3c9bcb416336496e4ad8450
SHA2568eb800c6538e5ddb13e4d4f52d9b1c979449ff4705b4a9fb8d311c84327e2e04
SHA512ac4c52e5ed11282180702a5730a108740c3fd66523b906bfb9b0d817f8ebfff323ee7a31c9e96e7c86480dd12d35bfa19b8bddcbf1126f05396d8300f05c03ff
-
Filesize
82KB
MD5546ffd2b72777e6a9e350780b79f99d4
SHA1a620be74a2f432656e38e51cd02fbdc3e3b312c2
SHA256c651b378896fad56ddeb1fec2c578a822bbb13269ec881f9420bbf47c9fbfbb5
SHA51257d49f830f9774ef0a4b6d026211360ea4ebcc6b236b72107401284559c7c589733bccc8af10c5a0cee5b97880d24a4e9954beb81887b1b124f8a42cca456fac