Analysis

  • max time kernel
    139s
  • max time network
    107s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/05/2024, 22:15

General

  • Target

    5bc9f4f4ed70856e6b955129d6398bc7ee8715af09d41ccfdffee924d530322b.exe

  • Size

    290KB

  • MD5

    5a3a6a26ef3ef19ff7ae7841a0058309

  • SHA1

    d8152a362aa42ee31dc8151dc6e7de042abb939c

  • SHA256

    5bc9f4f4ed70856e6b955129d6398bc7ee8715af09d41ccfdffee924d530322b

  • SHA512

    f6aae51796ab1ebba35f90bfd69fb31edc91c16427eac7af90a60ab85f00b50f66d34f1ec75f47af6ce2ac20fe6024866149c7b98d539f25e43579ffca425968

  • SSDEEP

    6144:xZ8azIUPlxvxL5Jon4yWPxfp3n4NMiJ8XVbE/xTmYKK/cjsS3H:xC0lPrd5uSxfp34Ke8XNKmYb/CsS3H

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5bc9f4f4ed70856e6b955129d6398bc7ee8715af09d41ccfdffee924d530322b.exe
    "C:\Users\Admin\AppData\Local\Temp\5bc9f4f4ed70856e6b955129d6398bc7ee8715af09d41ccfdffee924d530322b.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3940
    • C:\Users\Admin\AppData\Local\Temp\q8imdTjBOc11XoU.exe
      C:\Users\Admin\AppData\Local\Temp\q8imdTjBOc11XoU.exe
      2⤵
      • Executes dropped EXE
      PID:1576
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:3844

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

          Filesize

          392KB

          MD5

          9d62a149b3c366b935ec2ef546ab91b0

          SHA1

          f1f938c54a526a0a570fe870cd544045a72eeda3

          SHA256

          a9efdf4513981863676e3df7c995664893d37fe7adaa1d785024d1ed9ad2629f

          SHA512

          6aa501cad40eb7034d468cc1e31d50647dad5e6b6f78fdafa3b9aa16c7c6fe0b2a98ac81701aa256bd4aeda7d40ce8e52967ab13643d0ef4591da9dd96c1ed27

        • C:\Users\Admin\AppData\Local\Temp\q8imdTjBOc11XoU.exe

          Filesize

          219KB

          MD5

          e2312f199976d03a7cf41e453c5af246

          SHA1

          c723bf05f7132c9b66c4f91d6cc363d08b4ed622

          SHA256

          84fe7824717bb55d7f32c7487e37012a1bc6cd4c8c0202be4bfb07e770f8dc51

          SHA512

          a5cad97d8bcf893b79eed436ae8df232d7e53df86a0ed38b381c128c5d8c76c0caad41407ed564f2ea2725236eb98ea6d29413886ea22371920bf2b498b49686

        • C:\Windows\CTS.exe

          Filesize

          71KB

          MD5

          f9d4ab0a726adc9b5e4b7d7b724912f1

          SHA1

          3d42ca2098475924f70ee4a831c4f003b4682328

          SHA256

          b43be87e8586ca5e995979883468f3b3d9dc5212fbfd0b5f3341a5b7c56e0fbc

          SHA512

          22a5f0e4b2716244e978ee50771823926f86baf0382ece48fd049f039cf77b5eb0691d83c61148903cff081fdbea969f47b8ed521647717f42bbed5c64552432