Analysis

  • max time kernel
    138s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    05-05-2021 10:07

General

  • Target

    d331a53d_by_Libranalysis.exe

  • Size

    118KB

  • MD5

    d331a53d6deced27e44a1b23a897c660

  • SHA1

    a96d6f7f562943794a632b7071c2bc228477ed6f

  • SHA256

    29051e0cdfd29405d4766b2d09e93c03b190fc71d094d11fb0e7bc998187689d

  • SHA512

    632b1a37d395a9dad7e2ac1c47007b98c877f187ecf564935fa1cb9062ceed13eacd98cc9782e815d616c204e38e9c3bef43f4223c3f69a4b94562e899543a18

Score
10/10

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • ACProtect 1.3x - 1.4x DLL software 3 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 12 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d331a53d_by_Libranalysis.exe
    "C:\Users\Admin\AppData\Local\Temp\d331a53d_by_Libranalysis.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3872
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3856
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:1232
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1232 -s 1144
          4⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3764

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ctfmen.exe
    MD5

    54e565c16486516b6e90417adaab1452

    SHA1

    0bea045e3c7c5116c9f1241820b1a2051020f17b

    SHA256

    146e7747ffb92c777371bdf113992822f7f37ac4f71dc8b4d2fcdd836d0fb5fd

    SHA512

    1a0ec37e6705b80a24a61a467a661f75b621666cff9f81ec6870c0225e977dcedd99410e0e1c0ad908d2d450cfdefb2b7dd5e4aed15e13930d0a978f7444e909

  • C:\Windows\SysWOW64\ctfmen.exe
    MD5

    54e565c16486516b6e90417adaab1452

    SHA1

    0bea045e3c7c5116c9f1241820b1a2051020f17b

    SHA256

    146e7747ffb92c777371bdf113992822f7f37ac4f71dc8b4d2fcdd836d0fb5fd

    SHA512

    1a0ec37e6705b80a24a61a467a661f75b621666cff9f81ec6870c0225e977dcedd99410e0e1c0ad908d2d450cfdefb2b7dd5e4aed15e13930d0a978f7444e909

  • C:\Windows\SysWOW64\grcopy.dll
    MD5

    87890ee242a5c4f4169833889948de81

    SHA1

    454b2ad7d803d84e0c14f975b7f36ca8bfd116e5

    SHA256

    1f67a5d14f2c338f83f0494a5a52e950ad1eb3d4fb690bae8dfac3c85a7dded5

    SHA512

    ecf39318c5ff7df25dcf6cc40e7977fbec35195cfac9dddcea1efa7befc3bc3a4ab43c79b836fbf720a041d17fc78819cca06dead0d9c77990e11a5bdca4bc54

  • C:\Windows\SysWOW64\satornas.dll
    MD5

    254326f1921de85c9f877aedd6837ca5

    SHA1

    f92fa40bf5d7852f5c45301b45d37e241731ef83

    SHA256

    00b1dd2c78cebaf118f7dd3f6b7cfa71f4e9a8dc5f36aa6b934df27b2d6510ab

    SHA512

    960428efb16a1b88a99389a506582b6409b3c2862f3f443877aaeeb03f0a8b2fc50418894d355dcfafa506bdfc6b17f2a4b0af02ca35c100aec68a92b77c2f22

  • C:\Windows\SysWOW64\shervans.dll
    MD5

    67517a699acc94418e45433824bc084b

    SHA1

    f33275cb423a5bd8f76443908aa64fe301d25b58

    SHA256

    bf6b6b4311f34ab03e42737983ecfb8f425b186e1fd4f3ecb14ed0e8412d2ba0

    SHA512

    48936a4928771ba1381b58ff5c804ee0b194ad34364bc3fac4b094a85be1ec733558132c1882e3afeee5c596238177b376edecc5583ba5dbaa2faf07f1c9bb0a

  • C:\Windows\SysWOW64\smnss.exe
    MD5

    87890ee242a5c4f4169833889948de81

    SHA1

    454b2ad7d803d84e0c14f975b7f36ca8bfd116e5

    SHA256

    1f67a5d14f2c338f83f0494a5a52e950ad1eb3d4fb690bae8dfac3c85a7dded5

    SHA512

    ecf39318c5ff7df25dcf6cc40e7977fbec35195cfac9dddcea1efa7befc3bc3a4ab43c79b836fbf720a041d17fc78819cca06dead0d9c77990e11a5bdca4bc54

  • C:\Windows\SysWOW64\smnss.exe
    MD5

    87890ee242a5c4f4169833889948de81

    SHA1

    454b2ad7d803d84e0c14f975b7f36ca8bfd116e5

    SHA256

    1f67a5d14f2c338f83f0494a5a52e950ad1eb3d4fb690bae8dfac3c85a7dded5

    SHA512

    ecf39318c5ff7df25dcf6cc40e7977fbec35195cfac9dddcea1efa7befc3bc3a4ab43c79b836fbf720a041d17fc78819cca06dead0d9c77990e11a5bdca4bc54

  • \Windows\SysWOW64\shervans.dll
    MD5

    67517a699acc94418e45433824bc084b

    SHA1

    f33275cb423a5bd8f76443908aa64fe301d25b58

    SHA256

    bf6b6b4311f34ab03e42737983ecfb8f425b186e1fd4f3ecb14ed0e8412d2ba0

    SHA512

    48936a4928771ba1381b58ff5c804ee0b194ad34364bc3fac4b094a85be1ec733558132c1882e3afeee5c596238177b376edecc5583ba5dbaa2faf07f1c9bb0a

  • \Windows\SysWOW64\shervans.dll
    MD5

    67517a699acc94418e45433824bc084b

    SHA1

    f33275cb423a5bd8f76443908aa64fe301d25b58

    SHA256

    bf6b6b4311f34ab03e42737983ecfb8f425b186e1fd4f3ecb14ed0e8412d2ba0

    SHA512

    48936a4928771ba1381b58ff5c804ee0b194ad34364bc3fac4b094a85be1ec733558132c1882e3afeee5c596238177b376edecc5583ba5dbaa2faf07f1c9bb0a

  • memory/1232-118-0x0000000000000000-mapping.dmp
  • memory/3856-115-0x0000000000000000-mapping.dmp