Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14/10/2024, 23:14

General

  • Target

    c6dfe0dbb6e90965c7c0100e25c7cd76a205a062692cec290bd81b7509896dedN.exe

  • Size

    254KB

  • MD5

    550c16302b991cabb562bfb9d588d6f0

  • SHA1

    ef75af97fd6b18b9bc2fa2a7b297086aec739651

  • SHA256

    c6dfe0dbb6e90965c7c0100e25c7cd76a205a062692cec290bd81b7509896ded

  • SHA512

    abdb8f1b4ce5275a31bd7c48fdf568aa9273e300d8a85709ab43d6a958847ad7b200aecdbb6fa5e1360525f6f38122f232b375fa570be70f70b5809626e57008

  • SSDEEP

    6144:GjYKlAhUBVB3pQOAS+tCApf+sAt8QELXasC+njv9f1Ol:GjYRm7QOj+tCof+tW7C+nJfgl

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c6dfe0dbb6e90965c7c0100e25c7cd76a205a062692cec290bd81b7509896dedN.exe
    "C:\Users\Admin\AppData\Local\Temp\c6dfe0dbb6e90965c7c0100e25c7cd76a205a062692cec290bd81b7509896dedN.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Users\Admin\AppData\Local\Temp\jjNlqlTbY9VxuVk.exe
      C:\Users\Admin\AppData\Local\Temp\jjNlqlTbY9VxuVk.exe
      2⤵
      • Executes dropped EXE
      PID:2380
    • C:\Windows\CTS.exe
      "C:\Windows\CTS.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:2760

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\jjNlqlTbY9VxuVk.exe

          Filesize

          254KB

          MD5

          fe1b816529de5ee67906269c507e4f8e

          SHA1

          a9fb06ea459bc28d46bebc47e780f7f523fca0cc

          SHA256

          8eaf39682e97e9916677d029133f9e9e343d955f80573db8e6cbc21b5a10d4ef

          SHA512

          9c18a61ad20cda7819573695e005132a0b6d645e19392f2bc7aaeaa83d1ee39bac3f1f624d2347f51ae279497909a189ac0d87b8ca34c378841f586b9e05033c

        • C:\Windows\CTS.exe

          Filesize

          86KB

          MD5

          0f736d30fbdaebed364c4cd9f084e500

          SHA1

          d7e96b736463af4b3edacd5cc5525cb70c593334

          SHA256

          431b7f30b7f8d520f69066b03b8dccbb35a6cb40a53c5e2320c6b5acf96b2e34

          SHA512

          570a2f76d653414fedc12ed486f2bf0333dc860f52d70faa895d6b9951ac185317637d7b076e05c932f4c536259e19a952a716e9516d506d2a19de73c50f2566

        • \Users\Admin\AppData\Local\Temp\jjNlqlTbY9VxuVk.exe

          Filesize

          168KB

          MD5

          17275206102d1cf6f17346fd73300030

          SHA1

          bbec93f6fb2ae56c705efd6e58d6b3cc68bf1166

          SHA256

          dead0ebd5b5bf5d4b0e68ba975e9a70f98820e85d056b0a6b3775fc4df4da0f6

          SHA512

          ce14a4f95328bb9ce437c5d79084e9d647cb89b66cde86a540b200b1667edc76aa27a36061b6e2ceccecb70b9a011b4bd54040e2a480b8546888ba5cc84a01b3