Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
09/06/2024, 11:47
Behavioral task
behavioral1
Sample
eb0c15d0a6fc28d1a7a6e558e18b731e609e520fd9122077b5dd6022133e5636.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
eb0c15d0a6fc28d1a7a6e558e18b731e609e520fd9122077b5dd6022133e5636.exe
Resource
win10v2004-20240226-en
General
-
Target
eb0c15d0a6fc28d1a7a6e558e18b731e609e520fd9122077b5dd6022133e5636.exe
-
Size
81KB
-
MD5
36280ede77de4cbb4ed3595e28e49813
-
SHA1
e3ce9ada9ea1c4b53ca3858a3f71168c33622bf3
-
SHA256
eb0c15d0a6fc28d1a7a6e558e18b731e609e520fd9122077b5dd6022133e5636
-
SHA512
28a259cb2f878da8117947b63aa9517944f0660d4def559bf6307a0d04b388894407de7d60ff03df4ac9a80dca1f2923f2590c6ca499abd8e45b7c056261482e
-
SSDEEP
768:XUTNK2cNW0QbRsWjcd+6yBFLqJ4Z8qx70RM8/O/B2ZR1RGbLLRNeorZ9p:kzcNjQlsWjcd+xzl7SM+Gb5NeorZ9p
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 5 IoCs
resource yara_rule behavioral1/memory/2240-0-0x00000000001F0000-0x0000000000208000-memory.dmp UPX behavioral1/files/0x002a000000013a88-5.dat UPX behavioral1/memory/2248-13-0x0000000000310000-0x0000000000328000-memory.dmp UPX behavioral1/memory/2240-11-0x00000000001F0000-0x0000000000208000-memory.dmp UPX behavioral1/files/0x000d00000001342e-15.dat UPX -
Executes dropped EXE 1 IoCs
pid Process 2248 CTS.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2240-0-0x00000000001F0000-0x0000000000208000-memory.dmp upx behavioral1/files/0x002a000000013a88-5.dat upx behavioral1/memory/2248-13-0x0000000000310000-0x0000000000328000-memory.dmp upx behavioral1/memory/2240-11-0x00000000001F0000-0x0000000000208000-memory.dmp upx behavioral1/files/0x000d00000001342e-15.dat upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" eb0c15d0a6fc28d1a7a6e558e18b731e609e520fd9122077b5dd6022133e5636.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" CTS.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CTS.exe eb0c15d0a6fc28d1a7a6e558e18b731e609e520fd9122077b5dd6022133e5636.exe File created C:\Windows\CTS.exe CTS.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2240 eb0c15d0a6fc28d1a7a6e558e18b731e609e520fd9122077b5dd6022133e5636.exe Token: SeDebugPrivilege 2248 CTS.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2248 2240 eb0c15d0a6fc28d1a7a6e558e18b731e609e520fd9122077b5dd6022133e5636.exe 28 PID 2240 wrote to memory of 2248 2240 eb0c15d0a6fc28d1a7a6e558e18b731e609e520fd9122077b5dd6022133e5636.exe 28 PID 2240 wrote to memory of 2248 2240 eb0c15d0a6fc28d1a7a6e558e18b731e609e520fd9122077b5dd6022133e5636.exe 28 PID 2240 wrote to memory of 2248 2240 eb0c15d0a6fc28d1a7a6e558e18b731e609e520fd9122077b5dd6022133e5636.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb0c15d0a6fc28d1a7a6e558e18b731e609e520fd9122077b5dd6022133e5636.exe"C:\Users\Admin\AppData\Local\Temp\eb0c15d0a6fc28d1a7a6e558e18b731e609e520fd9122077b5dd6022133e5636.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\CTS.exe"C:\Windows\CTS.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2248
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD54da20a21c91c8e1c8761468291ad4e26
SHA17cd5300fa770417e50dabdb37e810568f3ef5e9c
SHA256245d87102e38e1dca2b2060a4748d8513d733513efa4e2668ff567aaef2dd7f0
SHA512d9a22525de3433269cc443da7e0aef762cbc87164ffed99bf7f31ea318434c12184391b037b1c5d9cc35ccacc84e2665d383da1551a80fe82773045848979102
-
Filesize
80KB
MD5b596af3e5821c709a22c661155600a7e
SHA19c1563c6c6374f63d8cf92098a5780d614ff7759
SHA25662ca133a4dac1f07c692b02092b18fa72fffb435be0e52a89e4e4f22c9f53624
SHA512ddbe2fcad0ace16e2c92a4ca3e499c1639bbc6b40bf8c9549cad133ef7e1f6431ea90f7be27cf7de393328564715ec38e2a829adc7e7b64d69aa90eed99e9baf