Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
05-05-2021 02:46
Static task
static1
Behavioral task
behavioral1
Sample
f81d2b083548afd9b722626a4d2d94ff9f180b9fbb57e66c42036a4317bca1cb.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
f81d2b083548afd9b722626a4d2d94ff9f180b9fbb57e66c42036a4317bca1cb.exe
Resource
win10v20210410
General
-
Target
f81d2b083548afd9b722626a4d2d94ff9f180b9fbb57e66c42036a4317bca1cb.exe
-
Size
118KB
-
MD5
d2d0810fa6f942c316339a48c865d41b
-
SHA1
d5adefd42699b367307639e1a298f07a56513e6c
-
SHA256
f81d2b083548afd9b722626a4d2d94ff9f180b9fbb57e66c42036a4317bca1cb
-
SHA512
b679711faf592c9aac2c10dd438974e2a52300c38ff4e647ce26de62e9c0f7c8fb70c6ebfab4dd11fe776dfd86159a41c61bb895d9877f1eed6168eed509c613
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 3 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Windows\SysWOW64\shervans.dll acprotect C:\Windows\SysWOW64\shervans.dll acprotect \Windows\SysWOW64\shervans.dll acprotect -
Executes dropped EXE 2 IoCs
Processes:
ctfmen.exesmnss.exepid process 1292 ctfmen.exe 3884 smnss.exe -
Loads dropped DLL 2 IoCs
Processes:
f81d2b083548afd9b722626a4d2d94ff9f180b9fbb57e66c42036a4317bca1cb.exesmnss.exepid process 3516 f81d2b083548afd9b722626a4d2d94ff9f180b9fbb57e66c42036a4317bca1cb.exe 3884 smnss.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
f81d2b083548afd9b722626a4d2d94ff9f180b9fbb57e66c42036a4317bca1cb.exesmnss.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ctfmen = "C:\\Windows\\system32\\ctfmen.exe" f81d2b083548afd9b722626a4d2d94ff9f180b9fbb57e66c42036a4317bca1cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ctfmen = "C:\\Windows\\system32\\ctfmen.exe" smnss.exe -
Maps connected drives based on registry 3 TTPs 6 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
smnss.exef81d2b083548afd9b722626a4d2d94ff9f180b9fbb57e66c42036a4317bca1cb.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum smnss.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 smnss.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\1 smnss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum f81d2b083548afd9b722626a4d2d94ff9f180b9fbb57e66c42036a4317bca1cb.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\0 f81d2b083548afd9b722626a4d2d94ff9f180b9fbb57e66c42036a4317bca1cb.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum\1 f81d2b083548afd9b722626a4d2d94ff9f180b9fbb57e66c42036a4317bca1cb.exe -
Drops file in System32 directory 12 IoCs
Processes:
f81d2b083548afd9b722626a4d2d94ff9f180b9fbb57e66c42036a4317bca1cb.exesmnss.exedescription ioc process File opened for modification C:\Windows\SysWOW64\shervans.dll f81d2b083548afd9b722626a4d2d94ff9f180b9fbb57e66c42036a4317bca1cb.exe File created C:\Windows\SysWOW64\smnss.exe f81d2b083548afd9b722626a4d2d94ff9f180b9fbb57e66c42036a4317bca1cb.exe File created C:\Windows\SysWOW64\satornas.dll f81d2b083548afd9b722626a4d2d94ff9f180b9fbb57e66c42036a4317bca1cb.exe File opened for modification C:\Windows\SysWOW64\satornas.dll f81d2b083548afd9b722626a4d2d94ff9f180b9fbb57e66c42036a4317bca1cb.exe File created C:\Windows\SysWOW64\zipfi.dll smnss.exe File created C:\Windows\SysWOW64\zipfiaq.dll smnss.exe File created C:\Windows\SysWOW64\smnss.exe smnss.exe File created C:\Windows\SysWOW64\ctfmen.exe f81d2b083548afd9b722626a4d2d94ff9f180b9fbb57e66c42036a4317bca1cb.exe File opened for modification C:\Windows\SysWOW64\ctfmen.exe f81d2b083548afd9b722626a4d2d94ff9f180b9fbb57e66c42036a4317bca1cb.exe File created C:\Windows\SysWOW64\shervans.dll f81d2b083548afd9b722626a4d2d94ff9f180b9fbb57e66c42036a4317bca1cb.exe File created C:\Windows\SysWOW64\grcopy.dll f81d2b083548afd9b722626a4d2d94ff9f180b9fbb57e66c42036a4317bca1cb.exe File opened for modification C:\Windows\SysWOW64\grcopy.dll f81d2b083548afd9b722626a4d2d94ff9f180b9fbb57e66c42036a4317bca1cb.exe -
Drops file in Program Files directory 64 IoCs
Processes:
smnss.exedescription ioc process File opened for modification C:\Program Files\7-Zip\Lang\cs.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\ko-kr.xml smnss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-bootstrap.xml smnss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-modules-editor-mimelookup-impl.xml smnss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-modules-spi-actions.xml smnss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-jmx.xml smnss.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-0018-0409-1000-0000000FF1CE.xml smnss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN058.XML smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Stationery\Peacock.htm smnss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\asl-v20.txt smnss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-modules-core-kit.xml smnss.exe File opened for modification C:\Program Files\LimitSearch.xml smnss.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Cambria.xml smnss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\ClientPreview_eula.txt smnss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL108.XML smnss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN105.XML smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsen.xml smnss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\about.html smnss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.equinox.p2.core.feature_1.3.0.v20140523-0116\epl-v10.html smnss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\olh001.htm smnss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-modules-keyring-impl.xml smnss.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-00E1-0000-1000-0000000FF1CE.xml smnss.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Marquee.xml smnss.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\1033\README.HTM smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert.xml smnss.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Red.xml smnss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN065.XML smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\mng2.txt smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsdeu.xml smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsptb.xml smnss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-modules-keyring-fallback.xml smnss.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Century Gothic.xml smnss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL002.XML smnss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN102.XML smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\ro.txt smnss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.equinox.launcher.win32.win32.x86_64_1.1.200.v20141007-2033\about.html smnss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\about.html smnss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-api-visual.xml smnss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\update_tracking\org-netbeans-lib-profiler-ui.xml smnss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\update_tracking\org-netbeans-modules-profiler-utilities.xml smnss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-api-caching.xml smnss.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AuthoredExtensions.16.xml smnss.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Aspect.xml smnss.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Century Schoolbook.xml smnss.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Times New Roman-Arial.xml smnss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL097.XML smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\ar.txt smnss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-api-annotations-common.xml smnss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-core-startup.xml smnss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\ExcelNaiveBayesCommandRanker.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\ja-jp-sym.xml smnss.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-006E-0409-1000-0000000FF1CE.xml smnss.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Grayscale.xml smnss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL026.XML smnss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL120.XML smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknumpad\osknumpadbase.xml smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\oskpredbase.xml smnss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-core-ui.xml smnss.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.Excel.Excel.x-none.msi.16.x-none.xml smnss.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.PowerPoint.PowerPoint.x-none.msi.16.x-none.xml smnss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\ModuleAutoDeps\org-openide-filesystems.xml smnss.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-openide-io.xml smnss.exe -
Modifies registry class 6 IoCs
Processes:
f81d2b083548afd9b722626a4d2d94ff9f180b9fbb57e66c42036a4317bca1cb.exesmnss.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\InprocServer32 f81d2b083548afd9b722626a4d2d94ff9f180b9fbb57e66c42036a4317bca1cb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node f81d2b083548afd9b722626a4d2d94ff9f180b9fbb57e66c42036a4317bca1cb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID f81d2b083548afd9b722626a4d2d94ff9f180b9fbb57e66c42036a4317bca1cb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED} f81d2b083548afd9b722626a4d2d94ff9f180b9fbb57e66c42036a4317bca1cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\InprocServer32\ = "C:\\Windows\\SysWow64\\shervans.dll" f81d2b083548afd9b722626a4d2d94ff9f180b9fbb57e66c42036a4317bca1cb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\InprocServer32\ = "C:\\Windows\\SysWow64\\shervans.dll" smnss.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
smnss.exedescription pid process Token: SeDebugPrivilege 3884 smnss.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
f81d2b083548afd9b722626a4d2d94ff9f180b9fbb57e66c42036a4317bca1cb.exectfmen.exedescription pid process target process PID 3516 wrote to memory of 1292 3516 f81d2b083548afd9b722626a4d2d94ff9f180b9fbb57e66c42036a4317bca1cb.exe ctfmen.exe PID 3516 wrote to memory of 1292 3516 f81d2b083548afd9b722626a4d2d94ff9f180b9fbb57e66c42036a4317bca1cb.exe ctfmen.exe PID 3516 wrote to memory of 1292 3516 f81d2b083548afd9b722626a4d2d94ff9f180b9fbb57e66c42036a4317bca1cb.exe ctfmen.exe PID 1292 wrote to memory of 3884 1292 ctfmen.exe smnss.exe PID 1292 wrote to memory of 3884 1292 ctfmen.exe smnss.exe PID 1292 wrote to memory of 3884 1292 ctfmen.exe smnss.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f81d2b083548afd9b722626a4d2d94ff9f180b9fbb57e66c42036a4317bca1cb.exe"C:\Users\Admin\AppData\Local\Temp\f81d2b083548afd9b722626a4d2d94ff9f180b9fbb57e66c42036a4317bca1cb.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\ctfmen.exectfmen.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\smnss.exeC:\Windows\system32\smnss.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SysWOW64\ctfmen.exeMD5
d5bdd7eb8097a8d9465e90db98041934
SHA1daca96d922fbe04adfcb7f7498ef85f44bd8674a
SHA256ca15d800af1464ee4afcc711bcb12c0855d6c647d49757054e38b05b3c2e8350
SHA512eea41739bb2ed986891471b8c6f7e0569bbfbe7707b78a48f641ad75054f6b252f63d4efb0a5f93671a5c3dee2cec9fd86dbbc3083ee1847fd4a3f4e9928b170
-
C:\Windows\SysWOW64\ctfmen.exeMD5
d5bdd7eb8097a8d9465e90db98041934
SHA1daca96d922fbe04adfcb7f7498ef85f44bd8674a
SHA256ca15d800af1464ee4afcc711bcb12c0855d6c647d49757054e38b05b3c2e8350
SHA512eea41739bb2ed986891471b8c6f7e0569bbfbe7707b78a48f641ad75054f6b252f63d4efb0a5f93671a5c3dee2cec9fd86dbbc3083ee1847fd4a3f4e9928b170
-
C:\Windows\SysWOW64\grcopy.dllMD5
cb52a8a409f78feb11bb923245583891
SHA133beb0ce175ce81206d00c94e3266c8372fba79c
SHA25613cdce27b18f55fca68babee47074fe0504c3b583203503c9b867b105ebf3706
SHA5127f0c996cdd4db3e910a6aa3e792358607ce24493f20c427bce291ecaca79ca76c147176c01613a13b8fd36b922c22f5701a1fc643c44e755d4bb4c496794824c
-
C:\Windows\SysWOW64\satornas.dllMD5
a43ac16daf59d5fc5d47b9aa2289551b
SHA1d902142b366363a95c728898b997ff53de1f8d81
SHA256b871dfaf51ebbf2acf09a080095677c826033f60a086c6e956867d04efe1580b
SHA512ce6cab4465817a11164b99027ca351aaed4ffe063928aa4d71a5b8b27ea141b8c223ea6b633134d05ca9efba4deacd7b7557fd9f3ad30d310a1ef276fa92c80a
-
C:\Windows\SysWOW64\shervans.dllMD5
ada472af90dfa600002d457bd59d9e70
SHA104bfa1ac291e1f9424e44dfa5b75a07855f5e19a
SHA25684643cf6b1f034958b57d94b4e6723a40a54005885e21f2a754ee6551f7f3ee1
SHA512c83b0975d636ec247ba7cab0047fb159fc503fae65cb5d2c72123da1392a7f466ab718b522f697ceafd038230cb2d7e44715510677b64fd928f41224f1c1f594
-
C:\Windows\SysWOW64\smnss.exeMD5
cb52a8a409f78feb11bb923245583891
SHA133beb0ce175ce81206d00c94e3266c8372fba79c
SHA25613cdce27b18f55fca68babee47074fe0504c3b583203503c9b867b105ebf3706
SHA5127f0c996cdd4db3e910a6aa3e792358607ce24493f20c427bce291ecaca79ca76c147176c01613a13b8fd36b922c22f5701a1fc643c44e755d4bb4c496794824c
-
C:\Windows\SysWOW64\smnss.exeMD5
cb52a8a409f78feb11bb923245583891
SHA133beb0ce175ce81206d00c94e3266c8372fba79c
SHA25613cdce27b18f55fca68babee47074fe0504c3b583203503c9b867b105ebf3706
SHA5127f0c996cdd4db3e910a6aa3e792358607ce24493f20c427bce291ecaca79ca76c147176c01613a13b8fd36b922c22f5701a1fc643c44e755d4bb4c496794824c
-
\Windows\SysWOW64\shervans.dllMD5
ada472af90dfa600002d457bd59d9e70
SHA104bfa1ac291e1f9424e44dfa5b75a07855f5e19a
SHA25684643cf6b1f034958b57d94b4e6723a40a54005885e21f2a754ee6551f7f3ee1
SHA512c83b0975d636ec247ba7cab0047fb159fc503fae65cb5d2c72123da1392a7f466ab718b522f697ceafd038230cb2d7e44715510677b64fd928f41224f1c1f594
-
\Windows\SysWOW64\shervans.dllMD5
ada472af90dfa600002d457bd59d9e70
SHA104bfa1ac291e1f9424e44dfa5b75a07855f5e19a
SHA25684643cf6b1f034958b57d94b4e6723a40a54005885e21f2a754ee6551f7f3ee1
SHA512c83b0975d636ec247ba7cab0047fb159fc503fae65cb5d2c72123da1392a7f466ab718b522f697ceafd038230cb2d7e44715510677b64fd928f41224f1c1f594
-
memory/1292-115-0x0000000000000000-mapping.dmp
-
memory/3884-118-0x0000000000000000-mapping.dmp