Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02/09/2024, 04:03
Static task
static1
Behavioral task
behavioral1
Sample
cf854de702f84d96403d756317f3fb2972f4cd6017527a70cc5d38a4f5cf3dfe.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cf854de702f84d96403d756317f3fb2972f4cd6017527a70cc5d38a4f5cf3dfe.exe
Resource
win10v2004-20240802-en
General
-
Target
cf854de702f84d96403d756317f3fb2972f4cd6017527a70cc5d38a4f5cf3dfe.exe
-
Size
1.2MB
-
MD5
5fae3777c6056a88818664998d3838f0
-
SHA1
2ef1bafaeabcdc76404afcb012271017401add74
-
SHA256
cf854de702f84d96403d756317f3fb2972f4cd6017527a70cc5d38a4f5cf3dfe
-
SHA512
5560c15a55ee9c1e0e1ba5ae44fd0bc1d3c66ef1c15f7bbd4b61bb8a7b612a3cc86a96a01fd1c9cb1baa871f88acae76b1f1f0c166d4d4b85d0c2a3cee65e418
-
SSDEEP
24576:G0jommda7Ae19NBbRHA7BmQVTuKujWc34jH2tYUB6:G0jf75BeZVhgGUU
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3064 qcfDpYvWjGMxNub.exe 2360 CTS.exe -
Loads dropped DLL 1 IoCs
pid Process 2644 cf854de702f84d96403d756317f3fb2972f4cd6017527a70cc5d38a4f5cf3dfe.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" cf854de702f84d96403d756317f3fb2972f4cd6017527a70cc5d38a4f5cf3dfe.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\CTS = "C:\\Windows\\CTS.exe" CTS.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_fi.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_hi.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_te.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdate.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\GoogleCrashHandler64.exe qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_bg.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_en-GB.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_fa.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_id.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_vi.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\GoogleUpdateOnDemand.exe qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_cs.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_iw.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_lt.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_ml.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_tr.dll qcfDpYvWjGMxNub.exe File opened for modification C:\Program Files (x86)\GUT99FF.tmp qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\psuser.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_da.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_is.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_mr.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_ru.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_sk.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\psmachine.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_ar.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\psmachine_64.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_bn.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_ms.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_uk.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\GoogleUpdateBroker.exe qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\GoogleUpdateComRegisterShell64.exe qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_sw.dll qcfDpYvWjGMxNub.exe File opened for modification C:\Program Files (x86)\GUM99FE.tmp\GoogleUpdateSetup.exe qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_lv.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_ca.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_de.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_en.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_gu.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_it.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_fr.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_hr.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_pl.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_pt-BR.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\GoogleCrashHandler.exe qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\npGoogleUpdate3.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_ta.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_zh-CN.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_zh-TW.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\GoogleUpdateCore.exe qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_pt-PT.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\GoogleUpdateSetup.exe qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_am.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_es-419.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_fil.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_ja.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_sl.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_th.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_ur.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_el.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_es.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_no.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\goopdateres_sr.dll qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\GoogleUpdateHelper.msi qcfDpYvWjGMxNub.exe File created C:\Program Files (x86)\GUM99FE.tmp\psuser_64.dll qcfDpYvWjGMxNub.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\CTS.exe cf854de702f84d96403d756317f3fb2972f4cd6017527a70cc5d38a4f5cf3dfe.exe File created C:\Windows\CTS.exe CTS.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf854de702f84d96403d756317f3fb2972f4cd6017527a70cc5d38a4f5cf3dfe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qcfDpYvWjGMxNub.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2644 cf854de702f84d96403d756317f3fb2972f4cd6017527a70cc5d38a4f5cf3dfe.exe Token: SeDebugPrivilege 2360 CTS.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2644 wrote to memory of 3064 2644 cf854de702f84d96403d756317f3fb2972f4cd6017527a70cc5d38a4f5cf3dfe.exe 30 PID 2644 wrote to memory of 3064 2644 cf854de702f84d96403d756317f3fb2972f4cd6017527a70cc5d38a4f5cf3dfe.exe 30 PID 2644 wrote to memory of 3064 2644 cf854de702f84d96403d756317f3fb2972f4cd6017527a70cc5d38a4f5cf3dfe.exe 30 PID 2644 wrote to memory of 3064 2644 cf854de702f84d96403d756317f3fb2972f4cd6017527a70cc5d38a4f5cf3dfe.exe 30 PID 2644 wrote to memory of 3064 2644 cf854de702f84d96403d756317f3fb2972f4cd6017527a70cc5d38a4f5cf3dfe.exe 30 PID 2644 wrote to memory of 3064 2644 cf854de702f84d96403d756317f3fb2972f4cd6017527a70cc5d38a4f5cf3dfe.exe 30 PID 2644 wrote to memory of 3064 2644 cf854de702f84d96403d756317f3fb2972f4cd6017527a70cc5d38a4f5cf3dfe.exe 30 PID 2644 wrote to memory of 2360 2644 cf854de702f84d96403d756317f3fb2972f4cd6017527a70cc5d38a4f5cf3dfe.exe 31 PID 2644 wrote to memory of 2360 2644 cf854de702f84d96403d756317f3fb2972f4cd6017527a70cc5d38a4f5cf3dfe.exe 31 PID 2644 wrote to memory of 2360 2644 cf854de702f84d96403d756317f3fb2972f4cd6017527a70cc5d38a4f5cf3dfe.exe 31 PID 2644 wrote to memory of 2360 2644 cf854de702f84d96403d756317f3fb2972f4cd6017527a70cc5d38a4f5cf3dfe.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf854de702f84d96403d756317f3fb2972f4cd6017527a70cc5d38a4f5cf3dfe.exe"C:\Users\Admin\AppData\Local\Temp\cf854de702f84d96403d756317f3fb2972f4cd6017527a70cc5d38a4f5cf3dfe.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\qcfDpYvWjGMxNub.exeC:\Users\Admin\AppData\Local\Temp\qcfDpYvWjGMxNub.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:3064
-
-
C:\Windows\CTS.exe"C:\Windows\CTS.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD50f736d30fbdaebed364c4cd9f084e500
SHA1d7e96b736463af4b3edacd5cc5525cb70c593334
SHA256431b7f30b7f8d520f69066b03b8dccbb35a6cb40a53c5e2320c6b5acf96b2e34
SHA512570a2f76d653414fedc12ed486f2bf0333dc860f52d70faa895d6b9951ac185317637d7b076e05c932f4c536259e19a952a716e9516d506d2a19de73c50f2566
-
Filesize
1.1MB
MD553baee50f7a69bf3bc0fffe25341a923
SHA10b7998f5517ed4e7c5aeea3a89d73b60d2a2d102
SHA256f91e258ea71dcbfc82371b2ee3e20852e45bef0cb946223d1141a6ef1dfb793f
SHA5120eb28032849f775f604b7064a4f00f7d802c8c2fd5c7bc21b48298e6c3d316286963794b4c6c4981199c21f56b08d9aa466a470d40738d1b633b7feddc8e6241