Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-07-2024 03:22

General

  • Target

    d10a4901947551e71a2290f145fb741a.exe

  • Size

    7.3MB

  • MD5

    d10a4901947551e71a2290f145fb741a

  • SHA1

    73ff0325e0bcdccc6e03cf51c1d1b21dd3428805

  • SHA256

    089087cd2e8a9489b0f5fd5514c7f416d4cdad92d0839d01c89fed8e96f68aec

  • SHA512

    6e295f32d0dfc8a1ab0447834b1d9ab23b798fb86307ae9424dc3069688965a4153e8be54c2878065caa1dfb10f18162462c3d10096031760c5cee2d9f6619f9

  • SSDEEP

    196608:Ip59FgrTtu/6+zhYTxGP+4KA40J/5tPh0sdOdWNK:IpNgM9fF5R5tPhkP

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d10a4901947551e71a2290f145fb741a.exe
    "C:\Users\Admin\AppData\Local\Temp\d10a4901947551e71a2290f145fb741a.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4612
    • C:\Users\Admin\AppData\Local\Temp\zkBN5LOfcpN1wpa.exe
      C:\Users\Admin\AppData\Local\Temp\zkBN5LOfcpN1wpa.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2136
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:4976

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

    Filesize

    394KB

    MD5

    caa11e12f7c3b3c8b683b2f3cfedf817

    SHA1

    3f1be8079757375dc81e1c85b103a60870c7b275

    SHA256

    e554fd961f4c3e68118ae29d52d84f322655c9fc211322b41c2d3a40a19eaa9d

    SHA512

    6f94c0d6cf06e86a9f93fd6553fe75cf5079056fadfb0650ed27516c8f0e6451a1ee059dd01d639c703aa38cd86dc85cacbe11ad5806ec9294b0abc5c8c4a1dd

  • C:\Users\Admin\AppData\Local\Temp\config\chocolatey.config.2136.update

    Filesize

    9KB

    MD5

    14ffcf07375b3952bd3f2fe52bb63c14

    SHA1

    ab2eadde4c614eb8f1f2cae09d989c5746796166

    SHA256

    6ccfdb5979e715d12e597b47e1d56db94cf6d3a105b94c6e5f4dd8bab28ef5ed

    SHA512

    14a32151f7f7c45971b4c1adfb61f6af5136b1db93b50d00c6e1e3171e25b19749817b4e916d023ee1822caee64961911103087ca516cf6a0eafce1d17641fc4

  • C:\Users\Admin\AppData\Local\Temp\config\chocolatey.config.backup

    Filesize

    809B

    MD5

    8b6737800745d3b99886d013b3392ac3

    SHA1

    bb94da3f294922d9e8d31879f2d145586a182e19

    SHA256

    86f10504ca147d13a157944f926141fe164a89fa8a71847458bda7102abb6594

    SHA512

    654dda9b645b4900ac6e5bb226494921194dab7de71d75806f645d9b94ed820055914073ef9a5407e468089c0b2ee4d021f03c2ea61e73889b553895e79713df

  • C:\Users\Admin\AppData\Local\Temp\logs\chocolatey.log

    Filesize

    4KB

    MD5

    4ed43d96f6febc34a9cbc271d96fbe63

    SHA1

    9e8d9408641ce04744a6ae63fec2828efcbe5568

    SHA256

    8128c0043cec2778e9078af27a4f9a67005a9e6a12e723dc296d56bea701d711

    SHA512

    9651402a54f6747f117ad21ca67b5d10168150e457cc86cd29c033348b4ade55df4efce8a6dfd6a4d902d8cfda6aa7eccc8e4db2af52cc759df800408b8a2631

  • C:\Users\Admin\AppData\Local\Temp\logs\chocolatey.log

    Filesize

    805B

    MD5

    8ddc8edf134513c3ce14849219f1dea2

    SHA1

    9f3998a556b2063598a4f93131a19dd019bf3338

    SHA256

    9b6239f10cb270aca06d3903a8e4eba3909768af7fbec7facf61b6b3f360a617

    SHA512

    f25996cae00b47dab0f1f7c59ef183ee05a6ebf95819eb2633d4d42f89d7dca52675e92fa00ae4d97b8abe219d80120164aec9d010895ff9823d9767c12b0925

  • C:\Users\Admin\AppData\Local\Temp\logs\chocolatey.log

    Filesize

    2KB

    MD5

    cab3b3b268df2160db703dc93b0ea2f6

    SHA1

    73088da31222a76b432f5d3d56f73d5c00c9f7b4

    SHA256

    3c47e9dcb84fe34ae8f3cea19f3f68774b1931ab79e34c04f4f4605aeb0d490e

    SHA512

    18e20f092d34430f848f5b79aba442f0166ee82420633dc680f9288a3b310812907557532879606fc175e02baaa3fb8db343902a57e7d22d7d424169c1ce31a7

  • C:\Users\Admin\AppData\Local\Temp\redirects\cpush.exe.ignore

    Filesize

    2B

    MD5

    81051bcc2cf1bedf378224b0a93e2877

    SHA1

    ba8ab5a0280b953aa97435ff8946cbcbb2755a27

    SHA256

    7eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6

    SHA512

    1b302a2f1e624a5fb5ad94ddc4e5f8bfd74d26fa37512d0e5face303d8c40eee0d0ffa3649f5da43f439914d128166cb6c4774a7caa3b174d7535451eb697b5d

  • C:\Users\Admin\AppData\Local\Temp\zkBN5LOfcpN1wpa.exe

    Filesize

    7.3MB

    MD5

    dd6b75a77601d62ac66df1b0a51a7de3

    SHA1

    699fc35deccb0cd6e341420903fc993535c2c98f

    SHA256

    2f46a1d48e1589e0aa10f215e77cb48fb90c531e19aa3c05d766f59b449f3c15

    SHA512

    43bd57e5379c22494aade734a45a443722327d48c7f06aa521048c99adba576e29bd70bba7bd28ba94f8f24f88efed7b8e5a1b3249cbfcb4d95fd0bc1f424d86

  • C:\Windows\CTS.exe

    Filesize

    71KB

    MD5

    f9d4ab0a726adc9b5e4b7d7b724912f1

    SHA1

    3d42ca2098475924f70ee4a831c4f003b4682328

    SHA256

    b43be87e8586ca5e995979883468f3b3d9dc5212fbfd0b5f3341a5b7c56e0fbc

    SHA512

    22a5f0e4b2716244e978ee50771823926f86baf0382ece48fd049f039cf77b5eb0691d83c61148903cff081fdbea969f47b8ed521647717f42bbed5c64552432

  • memory/2136-26-0x00007FFE97360000-0x00007FFE97E21000-memory.dmp

    Filesize

    10.8MB

  • memory/2136-34-0x0000000003540000-0x0000000003560000-memory.dmp

    Filesize

    128KB

  • memory/2136-62-0x000000001E260000-0x000000001E2D6000-memory.dmp

    Filesize

    472KB

  • memory/2136-61-0x000000001E190000-0x000000001E1E0000-memory.dmp

    Filesize

    320KB

  • memory/2136-63-0x000000001E160000-0x000000001E17E000-memory.dmp

    Filesize

    120KB

  • memory/2136-17-0x0000000000D60000-0x00000000014A6000-memory.dmp

    Filesize

    7.3MB

  • memory/2136-8-0x00007FFE97363000-0x00007FFE97365000-memory.dmp

    Filesize

    8KB

  • memory/2136-168-0x00007FFE97360000-0x00007FFE97E21000-memory.dmp

    Filesize

    10.8MB