Analysis

  • max time kernel
    157s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/03/2024, 23:52

General

  • Target

    d76471997f865417e58735c4a3745305.exe

  • Size

    33KB

  • MD5

    d76471997f865417e58735c4a3745305

  • SHA1

    1157c70ffb77a0aa59615b7b062a01e32ef32bb2

  • SHA256

    7207915491d03bed9dfa573a736534cb92f769427fafc96bb7048a2af0142daa

  • SHA512

    3efe69fe2b8fcc6ec0a0db8e92387929ab78e48fbd1061c25c03c6f051261c9fd8373b52df129cdad1aec28663bb4fe7f3f79ce5c7edc526c86e33b672628db0

  • SSDEEP

    768:XocAX3LKew369lp2z3Sd4baFXLjwP/Tgj93b8NIocVSEFljGudUvO:SKcR4mjD9r823FzdSO

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d76471997f865417e58735c4a3745305.exe
    "C:\Users\Admin\AppData\Local\Temp\d76471997f865417e58735c4a3745305.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3540
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:1180
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3804 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4508

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

      Filesize

      747KB

      MD5

      c6747a4b29608e0b030772dd7d885f0d

      SHA1

      e281e744f7e0b29783a8344dadb40107643f7144

      SHA256

      39ea44e9de87d6328ff27046d5adb4c32cf7456e1da615d313d747a157871e28

      SHA512

      5b34c047200b84b310e153eda0c807f00da5c0a75366eebadfb0fa5728367db622803666c7fa9abce076585f583880d0b46d194ff0f07df24ed6595edaaa5935

    • C:\Users\Admin\AppData\Local\Temp\iyh4VJGxAMzbfHP.exe

      Filesize

      33KB

      MD5

      04362715f48b6608ba8e1dd2c033fa9f

      SHA1

      03175e6c172f444992abb2d9c5cf27125f91bdb8

      SHA256

      1e25d24bd06828657cc20da6b1d8906768f36a1dc64bb62f39830410c80b360a

      SHA512

      3cf46d4f8df7be831a71efdfe2ced8f69d6edd2e8af832f0e12a2aaec3f6ca21eaa685be2b93a981b601947fb8ef157326bd4c26a26e7e0773af0a72ba5c2072

    • C:\Windows\CTS.exe

      Filesize

      29KB

      MD5

      70aa23c9229741a9b52e5ce388a883ac

      SHA1

      b42683e21e13de3f71db26635954d992ebe7119e

      SHA256

      9d25cc704b1c00c9d17903e25ca35c319663e997cb9da0b116790b639e9688f2

      SHA512

      be604a2ad5ab8a3e5edb8901016a76042ba873c8d05b4ef8eec31241377ec6b2a883b51c6912dc7640581ffa624547db334683975883ae74e62808b5ae9ab0b5

    • memory/1180-8-0x0000000000E80000-0x0000000000E97000-memory.dmp

      Filesize

      92KB

    • memory/1180-30-0x0000000000E80000-0x0000000000E97000-memory.dmp

      Filesize

      92KB

    • memory/3540-0-0x0000000000A30000-0x0000000000A47000-memory.dmp

      Filesize

      92KB

    • memory/3540-3-0x0000000000A30000-0x0000000000A47000-memory.dmp

      Filesize

      92KB

    • memory/3540-10-0x0000000000A30000-0x0000000000A47000-memory.dmp

      Filesize

      92KB