Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03-07-2024 03:22
Static task
static1
Behavioral task
behavioral1
Sample
d10a4901947551e71a2290f145fb741a.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
d10a4901947551e71a2290f145fb741a.exe
Resource
win10v2004-20240508-en
General
-
Target
d10a4901947551e71a2290f145fb741a.exe
-
Size
7.3MB
-
MD5
d10a4901947551e71a2290f145fb741a
-
SHA1
73ff0325e0bcdccc6e03cf51c1d1b21dd3428805
-
SHA256
089087cd2e8a9489b0f5fd5514c7f416d4cdad92d0839d01c89fed8e96f68aec
-
SHA512
6e295f32d0dfc8a1ab0447834b1d9ab23b798fb86307ae9424dc3069688965a4153e8be54c2878065caa1dfb10f18162462c3d10096031760c5cee2d9f6619f9
-
SSDEEP
196608:Ip59FgrTtu/6+zhYTxGP+4KA40J/5tPh0sdOdWNK:IpNgM9fF5R5tPhkP
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2136 zkBN5LOfcpN1wpa.exe 4976 CTS.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" d10a4901947551e71a2290f145fb741a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" CTS.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CTS.exe d10a4901947551e71a2290f145fb741a.exe File created C:\Windows\CTS.exe CTS.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4612 d10a4901947551e71a2290f145fb741a.exe Token: SeDebugPrivilege 4976 CTS.exe Token: SeDebugPrivilege 2136 zkBN5LOfcpN1wpa.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4612 wrote to memory of 2136 4612 d10a4901947551e71a2290f145fb741a.exe 81 PID 4612 wrote to memory of 2136 4612 d10a4901947551e71a2290f145fb741a.exe 81 PID 4612 wrote to memory of 4976 4612 d10a4901947551e71a2290f145fb741a.exe 83 PID 4612 wrote to memory of 4976 4612 d10a4901947551e71a2290f145fb741a.exe 83 PID 4612 wrote to memory of 4976 4612 d10a4901947551e71a2290f145fb741a.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\d10a4901947551e71a2290f145fb741a.exe"C:\Users\Admin\AppData\Local\Temp\d10a4901947551e71a2290f145fb741a.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\zkBN5LOfcpN1wpa.exeC:\Users\Admin\AppData\Local\Temp\zkBN5LOfcpN1wpa.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2136
-
-
C:\Windows\CTS.exe"C:\Windows\CTS.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
394KB
MD5caa11e12f7c3b3c8b683b2f3cfedf817
SHA13f1be8079757375dc81e1c85b103a60870c7b275
SHA256e554fd961f4c3e68118ae29d52d84f322655c9fc211322b41c2d3a40a19eaa9d
SHA5126f94c0d6cf06e86a9f93fd6553fe75cf5079056fadfb0650ed27516c8f0e6451a1ee059dd01d639c703aa38cd86dc85cacbe11ad5806ec9294b0abc5c8c4a1dd
-
Filesize
9KB
MD514ffcf07375b3952bd3f2fe52bb63c14
SHA1ab2eadde4c614eb8f1f2cae09d989c5746796166
SHA2566ccfdb5979e715d12e597b47e1d56db94cf6d3a105b94c6e5f4dd8bab28ef5ed
SHA51214a32151f7f7c45971b4c1adfb61f6af5136b1db93b50d00c6e1e3171e25b19749817b4e916d023ee1822caee64961911103087ca516cf6a0eafce1d17641fc4
-
Filesize
809B
MD58b6737800745d3b99886d013b3392ac3
SHA1bb94da3f294922d9e8d31879f2d145586a182e19
SHA25686f10504ca147d13a157944f926141fe164a89fa8a71847458bda7102abb6594
SHA512654dda9b645b4900ac6e5bb226494921194dab7de71d75806f645d9b94ed820055914073ef9a5407e468089c0b2ee4d021f03c2ea61e73889b553895e79713df
-
Filesize
4KB
MD54ed43d96f6febc34a9cbc271d96fbe63
SHA19e8d9408641ce04744a6ae63fec2828efcbe5568
SHA2568128c0043cec2778e9078af27a4f9a67005a9e6a12e723dc296d56bea701d711
SHA5129651402a54f6747f117ad21ca67b5d10168150e457cc86cd29c033348b4ade55df4efce8a6dfd6a4d902d8cfda6aa7eccc8e4db2af52cc759df800408b8a2631
-
Filesize
805B
MD58ddc8edf134513c3ce14849219f1dea2
SHA19f3998a556b2063598a4f93131a19dd019bf3338
SHA2569b6239f10cb270aca06d3903a8e4eba3909768af7fbec7facf61b6b3f360a617
SHA512f25996cae00b47dab0f1f7c59ef183ee05a6ebf95819eb2633d4d42f89d7dca52675e92fa00ae4d97b8abe219d80120164aec9d010895ff9823d9767c12b0925
-
Filesize
2KB
MD5cab3b3b268df2160db703dc93b0ea2f6
SHA173088da31222a76b432f5d3d56f73d5c00c9f7b4
SHA2563c47e9dcb84fe34ae8f3cea19f3f68774b1931ab79e34c04f4f4605aeb0d490e
SHA51218e20f092d34430f848f5b79aba442f0166ee82420633dc680f9288a3b310812907557532879606fc175e02baaa3fb8db343902a57e7d22d7d424169c1ce31a7
-
Filesize
2B
MD581051bcc2cf1bedf378224b0a93e2877
SHA1ba8ab5a0280b953aa97435ff8946cbcbb2755a27
SHA2567eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6
SHA5121b302a2f1e624a5fb5ad94ddc4e5f8bfd74d26fa37512d0e5face303d8c40eee0d0ffa3649f5da43f439914d128166cb6c4774a7caa3b174d7535451eb697b5d
-
Filesize
7.3MB
MD5dd6b75a77601d62ac66df1b0a51a7de3
SHA1699fc35deccb0cd6e341420903fc993535c2c98f
SHA2562f46a1d48e1589e0aa10f215e77cb48fb90c531e19aa3c05d766f59b449f3c15
SHA51243bd57e5379c22494aade734a45a443722327d48c7f06aa521048c99adba576e29bd70bba7bd28ba94f8f24f88efed7b8e5a1b3249cbfcb4d95fd0bc1f424d86
-
Filesize
71KB
MD5f9d4ab0a726adc9b5e4b7d7b724912f1
SHA13d42ca2098475924f70ee4a831c4f003b4682328
SHA256b43be87e8586ca5e995979883468f3b3d9dc5212fbfd0b5f3341a5b7c56e0fbc
SHA51222a5f0e4b2716244e978ee50771823926f86baf0382ece48fd049f039cf77b5eb0691d83c61148903cff081fdbea969f47b8ed521647717f42bbed5c64552432