Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
26/04/2024, 06:16
Static task
static1
Behavioral task
behavioral1
Sample
223aa8e7cd00601dd13a849875558c08.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
223aa8e7cd00601dd13a849875558c08.exe
Resource
win10v2004-20240226-en
General
-
Target
223aa8e7cd00601dd13a849875558c08.exe
-
Size
665KB
-
MD5
223aa8e7cd00601dd13a849875558c08
-
SHA1
82f3c8f54572e684acee1e91663cceb1084ccdca
-
SHA256
06b61ef008c44c0f0f56c57c1292dbb04b16c03f569c398ffe9082e3a72963cc
-
SHA512
8bba1f981a7eaa97cf4c409505f0c8f25defb5d6b939070c8146fe4da561777ff613ec0d6c3773f852f25390e256c8cb94190a3ae4aca5c038dc84e35d7545b0
-
SSDEEP
12288:5Bzdl+a78TmsXpXNqe7mqeJLIIQQVQ8Mzk8/XZg2tdFGLwtUGIWFaifXJ0O:nf+aeP91WSzBftdMyfI+akd
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2956 iD8nU7pfR4cQcuy.exe 1216 CTS.exe -
Loads dropped DLL 2 IoCs
pid Process 2044 223aa8e7cd00601dd13a849875558c08.exe 2032 Process not Found -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" 223aa8e7cd00601dd13a849875558c08.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" CTS.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CTS.exe 223aa8e7cd00601dd13a849875558c08.exe File created C:\Windows\CTS.exe CTS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2044 223aa8e7cd00601dd13a849875558c08.exe Token: SeDebugPrivilege 1216 CTS.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2956 2044 223aa8e7cd00601dd13a849875558c08.exe 28 PID 2044 wrote to memory of 2956 2044 223aa8e7cd00601dd13a849875558c08.exe 28 PID 2044 wrote to memory of 2956 2044 223aa8e7cd00601dd13a849875558c08.exe 28 PID 2044 wrote to memory of 2956 2044 223aa8e7cd00601dd13a849875558c08.exe 28 PID 2044 wrote to memory of 1216 2044 223aa8e7cd00601dd13a849875558c08.exe 30 PID 2044 wrote to memory of 1216 2044 223aa8e7cd00601dd13a849875558c08.exe 30 PID 2044 wrote to memory of 1216 2044 223aa8e7cd00601dd13a849875558c08.exe 30 PID 2044 wrote to memory of 1216 2044 223aa8e7cd00601dd13a849875558c08.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\223aa8e7cd00601dd13a849875558c08.exe"C:\Users\Admin\AppData\Local\Temp\223aa8e7cd00601dd13a849875558c08.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\iD8nU7pfR4cQcuy.exeC:\Users\Admin\AppData\Local\Temp\iD8nU7pfR4cQcuy.exe2⤵
- Executes dropped EXE
PID:2956
-
-
C:\Windows\CTS.exe"C:\Windows\CTS.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1216
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
665KB
MD5b964464b46bf580bd06d4b88179826b9
SHA13eb3794350068860da124f2e0489d08972bc9f74
SHA25604952871891175ba33758c1e7b45b90b59c851c051804c760d1e267249337e1b
SHA512897a254ae1988c186e3e93c3e85a06871ba4947253fa6d93f2203fe86bc99fd86d8c28f8f2701b3a4cf4197b53cd7000aec177db75c5c129c89c3d285b6804fb
-
Filesize
80KB
MD5ec704028ad7125c2fa52e04dc68c0ca3
SHA12a63f27d0138696c9c27a9ea2534e8f2ca11ddc4
SHA2565f77a5d7c9eac3b004820646dece450e315a6e3ed320dc183ae68d59cd2318bf
SHA512a008a08c980583b8698431ca44fa45d5565fdc5316dc3e58c47ae523e7a7a776162979b0c79f9c64f0b71e0d98fb49102679378354f76c270d0c99207c15d160
-
Filesize
584KB
MD5487138792576238d76ad63497f050803
SHA148379948ed6a93c4df1116b51d33e15627d67945
SHA2563515e307cf21fe8f37112b3a6e79c3c3b50aa202cc000df4bbf3343f083a2f70
SHA512b163fd09be5db2e20ec91745fdcc1615d6c71758d1309a33d4a27c5f57c6259ff11a120d4d58e281b26e59fcf90f982d1bd91a21b5e4883dc8e9537eccc46425