Analysis

  • max time kernel
    101s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/08/2024, 07:06

General

  • Target

    c4890dd22ba0f166c1658c3022d97c90N.exe

  • Size

    110KB

  • MD5

    c4890dd22ba0f166c1658c3022d97c90

  • SHA1

    eee80e851fa8bff597d8c3b788afb62e7362c428

  • SHA256

    6db1603ce68097dfdc5561726befd652bb9e5c7a7cf6a62dea379e174e512d45

  • SHA512

    fb932b9774f246b7575b9256e876e9b8aab281320641c839bdc8b283e8096a3f60df5660847aa6c7dcf4b48a2ea946f573533b5163c0e52f3b0ed5d250e1124c

  • SSDEEP

    3072:ZWrKR8W9Mj6yhPyKfXtAGsKG3ERrjjNB3+IQOren2UDgc:GjYKlAhUBVB3pQOargc

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c4890dd22ba0f166c1658c3022d97c90N.exe
    "C:\Users\Admin\AppData\Local\Temp\c4890dd22ba0f166c1658c3022d97c90N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4000
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:4768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\excel.exe_Rules.xml

    Filesize

    411KB

    MD5

    e31fe3d40f0cfc9f84171c8d97408212

    SHA1

    91963306aad2494df4b3891bc6ce07d1b96b791c

    SHA256

    9c2091d94bd1c86c6f2917534007be00fd22d75893122ae4c896102713de60fd

    SHA512

    0c015178d2159f26d7985280ea8f502408397dfd66968abca842cbc3b75b4e3a13bd3dce0ac8ae0bfda0b8813aa6c2411361808919832f251d9e7d14c1b69260

  • C:\Users\Admin\AppData\Local\Temp\2L0a8ZyEEhp9Afs.exe

    Filesize

    110KB

    MD5

    c2fc82ea7e476d757a85608739e01b26

    SHA1

    b8e5c019c6585556af295f1e565439ecdb732ec3

    SHA256

    249e8a9e8cfe62b3e4c14da3d0236da9e2b14d7683dd4b822befc4435d7e8cfb

    SHA512

    0c573c7e25f8465234fd04671fa38500efc23f1b8a41ee08a9fbfb16c4074514c8cd857a1207a28e619d278da566dd3d240fe317eb4ce10c106406d1e3076924

  • C:\Windows\CTS.exe

    Filesize

    86KB

    MD5

    0f736d30fbdaebed364c4cd9f084e500

    SHA1

    d7e96b736463af4b3edacd5cc5525cb70c593334

    SHA256

    431b7f30b7f8d520f69066b03b8dccbb35a6cb40a53c5e2320c6b5acf96b2e34

    SHA512

    570a2f76d653414fedc12ed486f2bf0333dc860f52d70faa895d6b9951ac185317637d7b076e05c932f4c536259e19a952a716e9516d506d2a19de73c50f2566