Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09-04-2024 23:13
Static task
static1
Behavioral task
behavioral1
Sample
ad89c3c45a1c7b2cd177cef9889ec598.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ad89c3c45a1c7b2cd177cef9889ec598.exe
Resource
win10v2004-20240226-en
General
-
Target
ad89c3c45a1c7b2cd177cef9889ec598.exe
-
Size
74KB
-
MD5
ad89c3c45a1c7b2cd177cef9889ec598
-
SHA1
81c4a97904798220f23249ed43f57db8d35cc34f
-
SHA256
65ae24ce822b4acbcc0b9f83b8cd4594492b3d47fd5deabdaffe64f8d361f47e
-
SHA512
1e477fadd535df7efb565bcc033bccb8e6bde6c853c7461f5e9e2f60e4cd940d71272f55b46b6992ea33268b99a0d00fe2dcaa1634faae66aee52bc6dc2b699b
-
SSDEEP
1536:Fc897UsWjcd9w+AyabjDbxE+MwmvlDuazTkc:ZhpAyazIlyazTkc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3020 CTS.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" CTS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" ad89c3c45a1c7b2cd177cef9889ec598.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CTS.exe ad89c3c45a1c7b2cd177cef9889ec598.exe File created C:\Windows\CTS.exe CTS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2936 ad89c3c45a1c7b2cd177cef9889ec598.exe Token: SeDebugPrivilege 3020 CTS.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2936 wrote to memory of 3020 2936 ad89c3c45a1c7b2cd177cef9889ec598.exe 28 PID 2936 wrote to memory of 3020 2936 ad89c3c45a1c7b2cd177cef9889ec598.exe 28 PID 2936 wrote to memory of 3020 2936 ad89c3c45a1c7b2cd177cef9889ec598.exe 28 PID 2936 wrote to memory of 3020 2936 ad89c3c45a1c7b2cd177cef9889ec598.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad89c3c45a1c7b2cd177cef9889ec598.exe"C:\Users\Admin\AppData\Local\Temp\ad89c3c45a1c7b2cd177cef9889ec598.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\CTS.exe"C:\Windows\CTS.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD54551ebaa43fa31ad0753003946436af5
SHA118bc9770d6f53f7260c5cb0b492af934a4fc52b3
SHA256323f9048188b13eb6c9a1caf63f7640c228d2b93709fedea11e584850f23e568
SHA512433d682f95b3e6baabc1c156e3ce5b5d218d891b78e16e2a1f193b04b1326cd81b65b83b7f1468651bc5df37ddbbdb728671758d773346ac35acd87e7952ccb7
-
Filesize
71KB
MD566df4ffab62e674af2e75b163563fc0b
SHA1dec8a197312e41eeb3cfef01cb2a443f0205cd6e
SHA256075a6eecd8da1795532318f9cf880efe42461f9464d63f74deb271d33110f163
SHA5121588dd78e6e8972013c40cdb6acfb84c8df7b081197233ce621904b645356c805d0424bb93dd46c55834dc47d9ff39ee1323cf8e670841b3fff24ab98ba87f25