Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 19:19
Static task
static1
Behavioral task
behavioral1
Sample
29383f9c7385e37f76bf8715e5aaa7d8.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
29383f9c7385e37f76bf8715e5aaa7d8.exe
Resource
win10v2004-20240226-en
General
-
Target
29383f9c7385e37f76bf8715e5aaa7d8.exe
-
Size
173KB
-
MD5
29383f9c7385e37f76bf8715e5aaa7d8
-
SHA1
0e1ec8a463afcdf9d0136eafa791b69f5301a638
-
SHA256
b490355db6b33166dfcc54c5c69b701ad04446e0983ecb1a5d51894b0cc3e4ac
-
SHA512
d1d99565fff8999841a3e7e4997184fbe46d847d602968a7843435805b016faaaccc9a390cf62b9e1c79805a4ea5d5739cea28153944f9915a40329ffe400313
-
SSDEEP
3072:ZRpAyazIliazTbqhs8L1SVNEeY9Kx4V40BzLjsiyDhFN5K1N5:xZ8azHqhnZSVNa0xS5uYr
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2256 CTS.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" 29383f9c7385e37f76bf8715e5aaa7d8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" CTS.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CTS.exe CTS.exe File created C:\Windows\CTS.exe 29383f9c7385e37f76bf8715e5aaa7d8.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2824 29383f9c7385e37f76bf8715e5aaa7d8.exe Token: SeDebugPrivilege 2256 CTS.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2256 2824 29383f9c7385e37f76bf8715e5aaa7d8.exe 28 PID 2824 wrote to memory of 2256 2824 29383f9c7385e37f76bf8715e5aaa7d8.exe 28 PID 2824 wrote to memory of 2256 2824 29383f9c7385e37f76bf8715e5aaa7d8.exe 28 PID 2824 wrote to memory of 2256 2824 29383f9c7385e37f76bf8715e5aaa7d8.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\29383f9c7385e37f76bf8715e5aaa7d8.exe"C:\Users\Admin\AppData\Local\Temp\29383f9c7385e37f76bf8715e5aaa7d8.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\CTS.exe"C:\Windows\CTS.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102KB
MD519cba741469f5bb6b163783795d2a178
SHA195a024c984663e54d9bc1d4bcf8be3f5c5faf5c3
SHA2563c07886a035e49653aa78a3d2546f09d0d252b0eb1b520ccde36bd9e62e8b6cd
SHA512102dcb16beb85ef18cff50fe52c0d8135bf141d249542692a1bafb3280d7df871fed18b68f93b592785c0008da28b2b507799bec1cd6a64732bee7fa28c60df1
-
Filesize
71KB
MD5f9d4ab0a726adc9b5e4b7d7b724912f1
SHA13d42ca2098475924f70ee4a831c4f003b4682328
SHA256b43be87e8586ca5e995979883468f3b3d9dc5212fbfd0b5f3341a5b7c56e0fbc
SHA51222a5f0e4b2716244e978ee50771823926f86baf0382ece48fd049f039cf77b5eb0691d83c61148903cff081fdbea969f47b8ed521647717f42bbed5c64552432