Overview
overview
7Static
static
3CustomPath...ck.exe
windows7-x64
7CustomPath...ck.exe
windows10-2004-x64
7TargetDir/CTNet.exe
windows7-x64
1TargetDir/CTNet.exe
windows10-2004-x64
1TargetDir/...pu.exe
windows7-x64
1TargetDir/...pu.exe
windows10-2004-x64
1TargetDir/...Ku.dll
windows7-x64
1TargetDir/...Ku.dll
windows10-2004-x64
1TargetDir/...vc.dll
windows7-x64
3TargetDir/...vc.dll
windows10-2004-x64
3TargetDir/...nd.dll
windows7-x64
1TargetDir/...nd.dll
windows10-2004-x64
1TargetDir/...ll.exe
windows7-x64
1TargetDir/...ll.exe
windows10-2004-x64
1TargetDir/Toolbox.exe
windows7-x64
7TargetDir/Toolbox.exe
windows10-2004-x64
7Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 21:41
Static task
static1
Behavioral task
behavioral1
Sample
CustomPath1/AddOnPack.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
CustomPath1/AddOnPack.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
TargetDir/CTNet.exe
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
TargetDir/CTNet.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
TargetDir/CTSUAppu.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
TargetDir/CTSUAppu.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
TargetDir/CTSUSDKu.dll
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
TargetDir/CTSUSDKu.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
TargetDir/Client/CTMTBSvc.dll
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
TargetDir/Client/CTMTBSvc.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
TargetDir/Client/HookWnd.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
TargetDir/Client/HookWnd.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
TargetDir/Client/ScsInstall.exe
Resource
win7-20240215-en
Behavioral task
behavioral14
Sample
TargetDir/Client/ScsInstall.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
TargetDir/Toolbox.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
TargetDir/Toolbox.exe
Resource
win10v2004-20240426-en
General
-
Target
TargetDir/Toolbox.exe
-
Size
2.0MB
-
MD5
5bf76395f7cc6fb3d8ca3366a3cebe0f
-
SHA1
5be555b30d6f95f640856dca23cb94fe4d69c565
-
SHA256
17e9dbb3f6f4ab7b699270681c4150cb69214e369d2b1d28b555cbe064b4ced3
-
SHA512
e06ec2d3899c4cfb0a3091665d1f0e6d673c4949d576781bdf53097f39e5e9a40a97729c17aa708a46464cc517ccdb951b3e0e19ea2b0d9aca13176685d21b41
-
SSDEEP
49152:xgMjYm5L8sz7O8xUfKf1EAsHg6Uh3Ab9dM2+zz3w29W/SNN0D8VLeb+7:xgMjnSmi8xUfKf1EA4g60G82+/A29W6V
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
CLMT6CLN.0001MT6Licensing.exepid process 2996 CLMT6CLN.0001 2540 MT6Licensing.exe -
Loads dropped DLL 15 IoCs
Processes:
Toolbox.exeCLMT6CLN.0001pid process 2556 Toolbox.exe 2556 Toolbox.exe 2556 Toolbox.exe 2556 Toolbox.exe 2996 CLMT6CLN.0001 2556 Toolbox.exe 2556 Toolbox.exe 2556 Toolbox.exe 2556 Toolbox.exe 2556 Toolbox.exe 2556 Toolbox.exe 2556 Toolbox.exe 2556 Toolbox.exe 2556 Toolbox.exe 2556 Toolbox.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
Toolbox.exedescription ioc process File opened (read-only) \??\Q: Toolbox.exe File opened (read-only) \??\Y: Toolbox.exe File opened (read-only) \??\Z: Toolbox.exe File opened (read-only) \??\I: Toolbox.exe File opened (read-only) \??\J: Toolbox.exe File opened (read-only) \??\N: Toolbox.exe File opened (read-only) \??\P: Toolbox.exe File opened (read-only) \??\R: Toolbox.exe File opened (read-only) \??\T: Toolbox.exe File opened (read-only) \??\E: Toolbox.exe File opened (read-only) \??\G: Toolbox.exe File opened (read-only) \??\L: Toolbox.exe File opened (read-only) \??\M: Toolbox.exe File opened (read-only) \??\W: Toolbox.exe File opened (read-only) \??\A: Toolbox.exe File opened (read-only) \??\H: Toolbox.exe File opened (read-only) \??\K: Toolbox.exe File opened (read-only) \??\V: Toolbox.exe File opened (read-only) \??\X: Toolbox.exe File opened (read-only) \??\B: Toolbox.exe File opened (read-only) \??\O: Toolbox.exe File opened (read-only) \??\S: Toolbox.exe File opened (read-only) \??\U: Toolbox.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
MT6Licensing.exedescription ioc process File opened for modification \??\PHYSICALDRIVE0 MT6Licensing.exe -
Drops file in Program Files directory 6 IoCs
Processes:
Toolbox.exedescription ioc process File opened for modification C:\Program Files (x86)\Common Files\Creative Labs Shared\Uninstall\Creative Media Toolbox 6\B4736000\SCS Uninstaller.dll Toolbox.exe File created C:\Program Files (x86)\Common Files\Creative Labs Shared\Uninstall\Creative Media Toolbox 6\B4736000\SCS Uninstaller.dll Toolbox.exe File opened for modification C:\Program Files (x86)\Common Files\Creative Labs Shared\Uninstall\Creative Media Toolbox 6\B4736000\UninstApplet.exe Toolbox.exe File created C:\Program Files (x86)\Common Files\Creative Labs Shared\Uninstall\Creative Media Toolbox 6\B4736000\UninstApplet.exe Toolbox.exe File opened for modification C:\Program Files (x86)\Common Files\Creative Labs Shared\Service\MT6Licensing.exe Toolbox.exe File created C:\Program Files (x86)\Common Files\Creative Labs Shared\Service\MT6Licensing.exe Toolbox.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
Toolbox.exedescription pid process target process PID 2556 wrote to memory of 2996 2556 Toolbox.exe CLMT6CLN.0001 PID 2556 wrote to memory of 2996 2556 Toolbox.exe CLMT6CLN.0001 PID 2556 wrote to memory of 2996 2556 Toolbox.exe CLMT6CLN.0001 PID 2556 wrote to memory of 2996 2556 Toolbox.exe CLMT6CLN.0001
Processes
-
C:\Users\Admin\AppData\Local\Temp\TargetDir\Toolbox.exe"C:\Users\Admin\AppData\Local\Temp\TargetDir\Toolbox.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\CLMT6CLN.0001"C:\Users\Admin\AppData\Local\Temp\CLMT6CLN.0001" 2556 "C:\Users\Admin\AppData\Local\Temp\""CLMT6CLN.0001.dir.0000"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2996
-
C:\Program Files (x86)\Common Files\Creative Labs Shared\Service\MT6Licensing.exe"C:\Program Files (x86)\Common Files\Creative Labs Shared\Service\MT6Licensing.exe"1⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
PID:2540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77KB
MD5d03466c36ef0e5c7694ff38b45271d9d
SHA1fd29b4cb0cb6aeaf0d00cc9831bf2926a6a76209
SHA256367e0c1f0c49c31f26ec6a8828fe5727d70c637fd8c4213d10e43c80a0ea259e
SHA512d790ae64ba4d635fc6aab00a6069b3d83f30a4a0b2b337156b60bec50c7ea7da0fc0b187b15f2d66b75d2a938bd9ad9f5df9ee16c41fbe791661798a2fab7de4
-
Filesize
28KB
MD5032bf633a0f8c2660bed431fbd1b1620
SHA13b8bac0206c63c6acaa2376b68fc643bbab9dc07
SHA2563ca7adb25bdd7a371abc150892ce20b05456ed6fb5d33403378a2871a03a6b78
SHA512fb4bf9e899a47e56c5ba34822cda57de6f27902f880f655b4e636ac11e124ef875c296e0b203b75ae8f9dcbd67e06be853568c0935936c211517450de2b30adc
-
Filesize
58KB
MD59fef04a50f79295c036cf000b0366ef8
SHA13ad827d46332a3fcecbe233ca8ed40c34cd75606
SHA2561935d7c352ddfb5e6caab256730b0978add0396347c072cfc0e8f45aa3f46d59
SHA5127222d49cb730ab157d75ff5a6e83b7b4514337ce555ba547bd1146516cdce16ce6aa9a24c4fceae5746b4e2ed64781a57e82852b0f41adc0ac4524e14de4c193
-
Filesize
252KB
MD5b14c5bd247479ec095f54b3e4393502a
SHA15e0c96b864cf775c0e59228fe56af6600a74eb84
SHA256e173db0236fd0b5f141a7e2a9aacd7239bf25c5b3a1f1ff2e87ffc1002dba491
SHA5123c22ecce186b2b27d2c5df98bed3b65a9bbe968826120ef2b6402d51adea37edfe0c2f62ec68fec9826bbc70affea7041654178a5594a30a9da9d16d48074fa4
-
Filesize
100KB
MD587023705114bea24825be4208c653dc8
SHA152fa9201c2ccb6156e64d583a9d8c39d44dec6ec
SHA25651c5e5c3aefad9f12d8310e4b76428d9ac4c19590693f8d3d72fd9c86a094eab
SHA5121586c6e20d508f6a0cae36931683fb88f8271125864f667cb24d7b87250b64e4e46d209b94bffc2eebf4baaa6dd189113ebdec61efd4dc6e8ed60e42b8ba4641
-
Filesize
287KB
MD51b8e43c6536cf66548ce3664d4efadf3
SHA1394b83ed56e586790123ac43a44031f07062b8d7
SHA256a854b2c384bdf6b571da6eef2c385758165c81c624f1dd7587d9d4ddbefd3c0c
SHA512ae35937d9d338d059272463d93c2b6bd813f94ce65826898cecac3e1653ba096e7e0618418206372e91c37b61674ddf923bdece70283c604e47cd6c5335b14b2
-
Filesize
579KB
MD50016c87dd7615daf6761cb63942a4f83
SHA1e43002da6d8284ddce961d2a96663ca044bdd306
SHA256e7a2b34bbc3d38d7461710ec157fc59b7a7f088a34d9a9e169e0913b9c23fe53
SHA512dc87106aa33eed7308e7db0060593978d54e1e3c1753b8e60a5ecc1521455ea5f215795a8777727ac52ba39586b6b659fa31cc763f1c9708aa32c463114066dc
-
Filesize
681KB
MD540e94cfda5dba901a7946cfcf92786f2
SHA180611328c6b303d2f138f37ed516501f02cece53
SHA256cf3dc52e150cdfdb5cad6d124895cb06631051ab8ad0af94bd9432c528e871ad
SHA512c4a003a83e63941ab7fcb0da01c6f269d0e989602c4e1d2753576f7ff6ed7d18adea3205218e4c6cd04e9d77cd0dd0a8d7cdba32f39db9de4cb2447bd4dd08d0