Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
16/04/2024, 21:42
Static task
static1
Behavioral task
behavioral1
Sample
4ae2c05af43eb24f22f4bf12bf6ef34566a9579fed9eb2dbe9efad870c177a98.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
4ae2c05af43eb24f22f4bf12bf6ef34566a9579fed9eb2dbe9efad870c177a98.exe
Resource
win10v2004-20240412-en
General
-
Target
4ae2c05af43eb24f22f4bf12bf6ef34566a9579fed9eb2dbe9efad870c177a98.exe
-
Size
123KB
-
MD5
288759a2ddb0ba4684214fe26a47b354
-
SHA1
d8a28e1baf9b0287c8cd353f70d0846bc8d5883a
-
SHA256
4ae2c05af43eb24f22f4bf12bf6ef34566a9579fed9eb2dbe9efad870c177a98
-
SHA512
c858fd2070c1bc51ee7e128cb783a515827c093e39d46ea8e9426e1eb777f9ed8742c4f6e49ce446e1f316d405dbefb101b6605bef71b5d7af320aeb39d14033
-
SSDEEP
1536:KcNjQlsWjcd+xzl7SMQ2AeoZNMOoaBlw+pC43HXgQZxTYFjh3v9kzFy90TQpdze7:1jr87Sb2zorlUj431a93v0TMp9e6LCGy
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2988 9yaqUqfJSkMRGzf.exe 2916 CTS.exe -
Loads dropped DLL 2 IoCs
pid Process 2932 4ae2c05af43eb24f22f4bf12bf6ef34566a9579fed9eb2dbe9efad870c177a98.exe 2932 4ae2c05af43eb24f22f4bf12bf6ef34566a9579fed9eb2dbe9efad870c177a98.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" 4ae2c05af43eb24f22f4bf12bf6ef34566a9579fed9eb2dbe9efad870c177a98.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" CTS.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CTS.exe 4ae2c05af43eb24f22f4bf12bf6ef34566a9579fed9eb2dbe9efad870c177a98.exe File created C:\Windows\CTS.exe CTS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2932 4ae2c05af43eb24f22f4bf12bf6ef34566a9579fed9eb2dbe9efad870c177a98.exe Token: SeDebugPrivilege 2916 CTS.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2932 wrote to memory of 2988 2932 4ae2c05af43eb24f22f4bf12bf6ef34566a9579fed9eb2dbe9efad870c177a98.exe 28 PID 2932 wrote to memory of 2988 2932 4ae2c05af43eb24f22f4bf12bf6ef34566a9579fed9eb2dbe9efad870c177a98.exe 28 PID 2932 wrote to memory of 2988 2932 4ae2c05af43eb24f22f4bf12bf6ef34566a9579fed9eb2dbe9efad870c177a98.exe 28 PID 2932 wrote to memory of 2988 2932 4ae2c05af43eb24f22f4bf12bf6ef34566a9579fed9eb2dbe9efad870c177a98.exe 28 PID 2932 wrote to memory of 2916 2932 4ae2c05af43eb24f22f4bf12bf6ef34566a9579fed9eb2dbe9efad870c177a98.exe 30 PID 2932 wrote to memory of 2916 2932 4ae2c05af43eb24f22f4bf12bf6ef34566a9579fed9eb2dbe9efad870c177a98.exe 30 PID 2932 wrote to memory of 2916 2932 4ae2c05af43eb24f22f4bf12bf6ef34566a9579fed9eb2dbe9efad870c177a98.exe 30 PID 2932 wrote to memory of 2916 2932 4ae2c05af43eb24f22f4bf12bf6ef34566a9579fed9eb2dbe9efad870c177a98.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ae2c05af43eb24f22f4bf12bf6ef34566a9579fed9eb2dbe9efad870c177a98.exe"C:\Users\Admin\AppData\Local\Temp\4ae2c05af43eb24f22f4bf12bf6ef34566a9579fed9eb2dbe9efad870c177a98.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\9yaqUqfJSkMRGzf.exeC:\Users\Admin\AppData\Local\Temp\9yaqUqfJSkMRGzf.exe2⤵
- Executes dropped EXE
PID:2988
-
-
C:\Windows\CTS.exe"C:\Windows\CTS.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
123KB
MD5071d805608c04c2ee1b3ddf514a0775e
SHA155262b5065bdfeaf97b0abbf6996146be909718c
SHA25669cebf536e9d42ca48ffe2b96a9a3335f4774f58ecbf77f8cf04d2a52b6870a1
SHA51203ea45caac887f1d3c91cdbc447521cf283f71628a3140ce62dbd2fccaf2729330cac1a5f53e8e02cb840ded4e3a4c0956f3aab1bee835a89ddb72ccecf4cf07
-
Filesize
59KB
MD5a7013fd980137854a484ddae4db165c5
SHA1726b485772138de438aa549bcd271e74cc155969
SHA256cae4dd6e200b11cc20962b41914be7a9c5c732e88d54169b42f010b48c5b2431
SHA512f1e8fad2ebadd68f86b6010ec65144f40003c646aac36ca2ae0d9060b6fb688be8241a401b507633ff7633ed6713294d15122b5561cd1b0a7c4cdda8458912ee
-
Filesize
64KB
MD5a32a382b8a5a906e03a83b4f3e5b7a9b
SHA111e2bdd0798761f93cce363329996af6c17ed796
SHA25675f12ea2f30d9c0d872dade345f30f562e6d93847b6a509ba53beec6d0b2c346
SHA512ec87dd957be21b135212454646dcabdd7ef9442cf714e2c1f6b42b81f0c3fa3b1875bde9a8b538e8a0aa2190225649c29e9ed0f25176e7659e55e422dd4efe4c