Analysis
-
max time kernel
101s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 07:06
Static task
static1
Behavioral task
behavioral1
Sample
c4890dd22ba0f166c1658c3022d97c90N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c4890dd22ba0f166c1658c3022d97c90N.exe
Resource
win10v2004-20240802-en
General
-
Target
c4890dd22ba0f166c1658c3022d97c90N.exe
-
Size
110KB
-
MD5
c4890dd22ba0f166c1658c3022d97c90
-
SHA1
eee80e851fa8bff597d8c3b788afb62e7362c428
-
SHA256
6db1603ce68097dfdc5561726befd652bb9e5c7a7cf6a62dea379e174e512d45
-
SHA512
fb932b9774f246b7575b9256e876e9b8aab281320641c839bdc8b283e8096a3f60df5660847aa6c7dcf4b48a2ea946f573533b5163c0e52f3b0ed5d250e1124c
-
SSDEEP
3072:ZWrKR8W9Mj6yhPyKfXtAGsKG3ERrjjNB3+IQOren2UDgc:GjYKlAhUBVB3pQOargc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4768 CTS.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" c4890dd22ba0f166c1658c3022d97c90N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" CTS.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CTS.exe c4890dd22ba0f166c1658c3022d97c90N.exe File created C:\Windows\CTS.exe CTS.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CTS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c4890dd22ba0f166c1658c3022d97c90N.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4000 c4890dd22ba0f166c1658c3022d97c90N.exe Token: SeDebugPrivilege 4768 CTS.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4000 wrote to memory of 4768 4000 c4890dd22ba0f166c1658c3022d97c90N.exe 86 PID 4000 wrote to memory of 4768 4000 c4890dd22ba0f166c1658c3022d97c90N.exe 86 PID 4000 wrote to memory of 4768 4000 c4890dd22ba0f166c1658c3022d97c90N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4890dd22ba0f166c1658c3022d97c90N.exe"C:\Users\Admin\AppData\Local\Temp\c4890dd22ba0f166c1658c3022d97c90N.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\CTS.exe"C:\Windows\CTS.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
411KB
MD5e31fe3d40f0cfc9f84171c8d97408212
SHA191963306aad2494df4b3891bc6ce07d1b96b791c
SHA2569c2091d94bd1c86c6f2917534007be00fd22d75893122ae4c896102713de60fd
SHA5120c015178d2159f26d7985280ea8f502408397dfd66968abca842cbc3b75b4e3a13bd3dce0ac8ae0bfda0b8813aa6c2411361808919832f251d9e7d14c1b69260
-
Filesize
110KB
MD5c2fc82ea7e476d757a85608739e01b26
SHA1b8e5c019c6585556af295f1e565439ecdb732ec3
SHA256249e8a9e8cfe62b3e4c14da3d0236da9e2b14d7683dd4b822befc4435d7e8cfb
SHA5120c573c7e25f8465234fd04671fa38500efc23f1b8a41ee08a9fbfb16c4074514c8cd857a1207a28e619d278da566dd3d240fe317eb4ce10c106406d1e3076924
-
Filesize
86KB
MD50f736d30fbdaebed364c4cd9f084e500
SHA1d7e96b736463af4b3edacd5cc5525cb70c593334
SHA256431b7f30b7f8d520f69066b03b8dccbb35a6cb40a53c5e2320c6b5acf96b2e34
SHA512570a2f76d653414fedc12ed486f2bf0333dc860f52d70faa895d6b9951ac185317637d7b076e05c932f4c536259e19a952a716e9516d506d2a19de73c50f2566