Analysis

  • max time kernel
    1501s
  • max time network
    1499s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240412-en
  • resource tags

    arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    25-04-2024 14:40

General

  • Target

    29d7ce5a27c3b1f26db84d5c6e0ae0899c3bf7bc1c345ac89cfb38c7e7baba53.exe

  • Size

    595KB

  • MD5

    f104e0cddd5679a3ffa2a3b5ee70eefe

  • SHA1

    1a2e827e24bc502f2e041c23ddf64abc438b7e77

  • SHA256

    29d7ce5a27c3b1f26db84d5c6e0ae0899c3bf7bc1c345ac89cfb38c7e7baba53

  • SHA512

    74f9ff60c358653ccf1f97c2a82ee59ca43685c34a67d0d9936355ec45964556336a9a034276471d85b49c802a4af3becbf9e750094c9fa8abe50f0aff15eae5

  • SSDEEP

    12288:hS0bPOw7r916Bd9nBedIoomaUu56GNIZTTN6VnRMfuQnjd6j:DZ516D9n/mar56G+T4Z6fuQnjEj

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\29d7ce5a27c3b1f26db84d5c6e0ae0899c3bf7bc1c345ac89cfb38c7e7baba53.exe
    "C:\Users\Admin\AppData\Local\Temp\29d7ce5a27c3b1f26db84d5c6e0ae0899c3bf7bc1c345ac89cfb38c7e7baba53.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2552
    • C:\Users\Admin\AppData\Local\Temp\2mrfdQcyVLfQR2Z.exe
      C:\Users\Admin\AppData\Local\Temp\2mrfdQcyVLfQR2Z.exe
      2⤵
      • Executes dropped EXE
      PID:4408
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:3684

Network

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Privilege Escalation

Boot or Logon Autostart Execution

1
T1547

Registry Run Keys / Startup Folder

1
T1547.001

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Collection

Data from Local System

1
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml
    Filesize

    394KB

    MD5

    d5f803cb4e579d06d5784c94ee59ab2f

    SHA1

    3edeff96889e1fcf7decc7679480e5e16ebba783

    SHA256

    b1a1f05dd5a942e18cc3cae23cfa4eaeb7f9be20b1d2ab9aa15358ba00c73bee

    SHA512

    ee406112cf12b2abe0929315be4f627b4edc396acbdffd22f9dcc474e4bf6cc7976aef2489bc59ae65ae81931d17b0587b31613f03ad12125b040b9db84ce311

  • C:\Users\Admin\AppData\Local\Temp\2mrfdQcyVLfQR2Z.exe
    Filesize

    595KB

    MD5

    f2ee0f110baa9b0da39231b26ad59ca5

    SHA1

    9b2987e5bedd969147864e7c9b5ee960ae48c3f1

    SHA256

    21685e04291c0d2e4455d44a5340a15bd65ae86b6c4dc5c2e8ebc9ba56eee67d

    SHA512

    e40ad1455c948af77718e3e2a3bab983ad37ff8151a1b3116464ab02252ae2cd34ceaed91adb5273873bdb76b68ba7e87c7857be90f39193777da0018dd9f90b

  • C:\Users\Admin\AppData\Local\Temp\2mrfdQcyVLfQR2Z.exe
    Filesize

    524KB

    MD5

    645d5875c0ce2052d93943c62238a06e

    SHA1

    38c00dfaa6e0192e1157212d5baf42a8db869776

    SHA256

    66ef54018ef1207394bef76bcb0411f2fbbedd6230a812026bf8f1710218dbf9

    SHA512

    eb9654b527ddc15fae042ef6fa6b8a25f76c2fc21314abd1d629bac5066cfa11d9f3c1191150dc7784b20e5e47c4855ab97d34fadf904989a7a43ccd626949fe

  • C:\Windows\CTS.exe
    Filesize

    71KB

    MD5

    66df4ffab62e674af2e75b163563fc0b

    SHA1

    dec8a197312e41eeb3cfef01cb2a443f0205cd6e

    SHA256

    075a6eecd8da1795532318f9cf880efe42461f9464d63f74deb271d33110f163

    SHA512

    1588dd78e6e8972013c40cdb6acfb84c8df7b081197233ce621904b645356c805d0424bb93dd46c55834dc47d9ff39ee1323cf8e670841b3fff24ab98ba87f25