Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2024, 05:22
Static task
static1
Behavioral task
behavioral1
Sample
f9eb4e8114e84f8dbd34fa1d2098e974ba0c10aa1debfda07a3b7ac57d0a3d51.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
f9eb4e8114e84f8dbd34fa1d2098e974ba0c10aa1debfda07a3b7ac57d0a3d51.exe
Resource
win10v2004-20240226-en
General
-
Target
f9eb4e8114e84f8dbd34fa1d2098e974ba0c10aa1debfda07a3b7ac57d0a3d51.exe
-
Size
80KB
-
MD5
76a52a8d224cf6a597cf639e8f098f53
-
SHA1
82e2dafdad7d7b26dbaa26123b8627060d77e147
-
SHA256
f9eb4e8114e84f8dbd34fa1d2098e974ba0c10aa1debfda07a3b7ac57d0a3d51
-
SHA512
2b94f2e1cce9d697b99c8b8a4a47e1bc5f5e0450a27b562e9bf554c9856b7451340555a15ef9a40c4e6b8f8c97e103fbc5c4594946c69ad78b4d060f78fe4039
-
SSDEEP
768:JNK2cNW0QbRsWjcd+6yBFLqJ4Z8qx70RM8/O/B2Z9tRQS:pcNjQlsWjcd+xzl7SMQQS
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 32 CTS.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" f9eb4e8114e84f8dbd34fa1d2098e974ba0c10aa1debfda07a3b7ac57d0a3d51.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" CTS.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CTS.exe f9eb4e8114e84f8dbd34fa1d2098e974ba0c10aa1debfda07a3b7ac57d0a3d51.exe File created C:\Windows\CTS.exe CTS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2292 f9eb4e8114e84f8dbd34fa1d2098e974ba0c10aa1debfda07a3b7ac57d0a3d51.exe Token: SeDebugPrivilege 32 CTS.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2292 wrote to memory of 32 2292 f9eb4e8114e84f8dbd34fa1d2098e974ba0c10aa1debfda07a3b7ac57d0a3d51.exe 86 PID 2292 wrote to memory of 32 2292 f9eb4e8114e84f8dbd34fa1d2098e974ba0c10aa1debfda07a3b7ac57d0a3d51.exe 86 PID 2292 wrote to memory of 32 2292 f9eb4e8114e84f8dbd34fa1d2098e974ba0c10aa1debfda07a3b7ac57d0a3d51.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9eb4e8114e84f8dbd34fa1d2098e974ba0c10aa1debfda07a3b7ac57d0a3d51.exe"C:\Users\Admin\AppData\Local\Temp\f9eb4e8114e84f8dbd34fa1d2098e974ba0c10aa1debfda07a3b7ac57d0a3d51.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\CTS.exe"C:\Windows\CTS.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:32
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
403KB
MD51602f9371e27ba878ea1e6f70b008862
SHA165956d049f137241a43477413d1c7766756e55dc
SHA25647942526e99d381ea3b7235b13cf73b9d95ef221c662716e985151952a65d991
SHA512234ae656704adc7c427c48f4b4da4bed090903b21079f5a041be6d153df7f349d8431b29c1cf0e16452699f62efc4d128fd63af780ca1c12600d24f629450036
-
Filesize
80KB
MD595d06681de0decaeac0994b31e9bad83
SHA1617c73e354012962563747aa97c609e29377c563
SHA256d1b01763c86b1b6648c9f8355d7a9922ab91139c5a7ac352375b8c08867c6c2a
SHA512e4301175e251d9d93fb7f25642b90c953c1e617f785552ed709a992ea529f73dfc0715031e6e1942b25053bca7771f3fae932f9c62f590822b25f1b9facc14a4
-
Filesize
80KB
MD5ec704028ad7125c2fa52e04dc68c0ca3
SHA12a63f27d0138696c9c27a9ea2534e8f2ca11ddc4
SHA2565f77a5d7c9eac3b004820646dece450e315a6e3ed320dc183ae68d59cd2318bf
SHA512a008a08c980583b8698431ca44fa45d5565fdc5316dc3e58c47ae523e7a7a776162979b0c79f9c64f0b71e0d98fb49102679378354f76c270d0c99207c15d160