Analysis

  • max time kernel
    143s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/04/2024, 18:54

General

  • Target

    10fbd8cfdd586c3cca7ecf1fc975ca8f967e18ad251a93ad1c02d5021201305c.exe

  • Size

    262KB

  • MD5

    bf20300654993740ab49a68a6e9c95fb

  • SHA1

    119efbc9a21c7c385d5db4830f12c3286c552be4

  • SHA256

    10fbd8cfdd586c3cca7ecf1fc975ca8f967e18ad251a93ad1c02d5021201305c

  • SHA512

    92c900f1d7d90e3e2c5d37998a8bea4e858de030bee8e780271c91166273b39083c7c32bb4925b5dd0ed1f62893e31b98809c590a24cda4d1a97f9338bcb05db

  • SSDEEP

    3072:ZRpAyazIliazToPtJlmjsTIvSKUvtfdj2c95QcTuCAsYzGKEw6FGsS3APBp6V7fF:xZ8azEPasWvyt1T53AsD/sf35flqHXY

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\10fbd8cfdd586c3cca7ecf1fc975ca8f967e18ad251a93ad1c02d5021201305c.exe
    "C:\Users\Admin\AppData\Local\Temp\10fbd8cfdd586c3cca7ecf1fc975ca8f967e18ad251a93ad1c02d5021201305c.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2664
    • C:\Users\Admin\AppData\Local\Temp\2QvX6yGRGXPe3FW.exe
      C:\Users\Admin\AppData\Local\Temp\2QvX6yGRGXPe3FW.exe
      2⤵
      • Executes dropped EXE
      PID:632
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:1580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

    Filesize

    394KB

    MD5

    cef1b59062d10174519d9b34ee69250a

    SHA1

    c7cd3f296d47742b0e7aff7474e5bf0a160181d7

    SHA256

    4b5a486d4b3303d24098a830a528820d942577545fd1373e995114df4c9dd617

    SHA512

    9d86acdeeccb4881585e8d80edb60f5bfa7cbff578a42f7aeec84ef856a20d03ae231bcc287af7e8fa6fef6b2f11232f6dc5466df428c9632e1094390b2cb5fd

  • C:\Users\Admin\AppData\Local\Temp\2QvX6yGRGXPe3FW.exe

    Filesize

    191KB

    MD5

    94a363cd532d88ac33997c25657a19b5

    SHA1

    a98f1a8361d0183651c0ef457b9ac4339e429bea

    SHA256

    13b98844b2fa4a39a4d8ebb414fc79450d5ab4f0c8f5141ac06d40b2a0431ea4

    SHA512

    3b1c87a67f63e4276453ec1e322f0c13896dd0524ef35f4e4037a481ce354feaa98440f85b784c0b90a900c59ef115654f687457180ea433ea0100427f5c26f5

  • C:\Windows\CTS.exe

    Filesize

    71KB

    MD5

    f9d4ab0a726adc9b5e4b7d7b724912f1

    SHA1

    3d42ca2098475924f70ee4a831c4f003b4682328

    SHA256

    b43be87e8586ca5e995979883468f3b3d9dc5212fbfd0b5f3341a5b7c56e0fbc

    SHA512

    22a5f0e4b2716244e978ee50771823926f86baf0382ece48fd049f039cf77b5eb0691d83c61148903cff081fdbea969f47b8ed521647717f42bbed5c64552432