Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2023, 20:23

General

  • Target

    NEAS.4e563d84c6b217afe7c56add4dd84d60.exe

  • Size

    70KB

  • MD5

    4e563d84c6b217afe7c56add4dd84d60

  • SHA1

    641d2fbc97225ffbd65d83cb73094316ba2547e2

  • SHA256

    191ea4a15f344e7f68660ed1fac5494f0467f27fb2c02d62620631fc66cc4c50

  • SHA512

    0e7818f64007a75066fe47a55f3ef04fac54f99763d1d0fc83cb122bedf20a27d8db1176e25a81f3a755fbdf13fe02c8cb8b276bc6ee3210d64ff63a63e22363

  • SSDEEP

    1536:Jq5VwWDjDkdTRqHFOn8tIbbeYiuZIFS9b1YTjipvF2a:Jq5ud9qHFO8Kf3rIIb1YvQd2a

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 3 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.4e563d84c6b217afe7c56add4dd84d60.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.4e563d84c6b217afe7c56add4dd84d60.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4620
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3348
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:3868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    96d519f87dcb5c6de3f10fd1d2763ad7

    SHA1

    999b6495c1955c20519bbd1eec83317559640018

    SHA256

    8f6d3e86c0f63c9506086920d39490168081b073ee13a187f03f4ee4ff52bf6e

    SHA512

    9802ad01d69c4cddffe1744f673ac624082e01de6f108e0ca7e3c4b9375ff5191766bbb2a2149030f46db2d1728c265e1abdff4878ba40732c02ace5b39bf411

  • C:\Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    96d519f87dcb5c6de3f10fd1d2763ad7

    SHA1

    999b6495c1955c20519bbd1eec83317559640018

    SHA256

    8f6d3e86c0f63c9506086920d39490168081b073ee13a187f03f4ee4ff52bf6e

    SHA512

    9802ad01d69c4cddffe1744f673ac624082e01de6f108e0ca7e3c4b9375ff5191766bbb2a2149030f46db2d1728c265e1abdff4878ba40732c02ace5b39bf411

  • C:\Windows\SysWOW64\grcopy.dll

    Filesize

    70KB

    MD5

    30c3cc35f3803b6a57cdbe0739637435

    SHA1

    31af7aea3200dfe61f68c769c50959f93e63f0fe

    SHA256

    a2f6968aed7715b372bc28c3b11798f057e5538ff6e21732add396d3040ee078

    SHA512

    60d471fd28ed8b6f5a403def3d23c1b282cf422075fe1ece69a0e30c6ebae715ed8f61c63b307d2c1eafa3fb0ca39d30e942db982e3f85ffa296714e1ecb0627

  • C:\Windows\SysWOW64\grcopy.dll

    Filesize

    70KB

    MD5

    30c3cc35f3803b6a57cdbe0739637435

    SHA1

    31af7aea3200dfe61f68c769c50959f93e63f0fe

    SHA256

    a2f6968aed7715b372bc28c3b11798f057e5538ff6e21732add396d3040ee078

    SHA512

    60d471fd28ed8b6f5a403def3d23c1b282cf422075fe1ece69a0e30c6ebae715ed8f61c63b307d2c1eafa3fb0ca39d30e942db982e3f85ffa296714e1ecb0627

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    6e3a6ebacbb1fc74448599b4fe10c476

    SHA1

    54c522ca9b051f5e3d8fba9bbfb1a545a8e8904d

    SHA256

    fe65bf9b57c706a4439c952f8fedc155f65bdd905a92745c7ce259a6aeee88eb

    SHA512

    311b199b356374e86c9e4f4f194cc798651432003636fc5f9b59763860ac1398e735812381824b20bc2be755ff29033b30f6881b9d38997072547639a4c88c38

  • C:\Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    5fba5ad46c8deb6046065a3005039f89

    SHA1

    b9a4b2ce0a315e633d61cff08b4ca4257f5ab3a7

    SHA256

    2f4ca4f82ec06ba2b4d14a0cf0a549011fe85ec0f33e2e07e2dc3c173ad45ad4

    SHA512

    9e3098f3fab6666fcd77c07696e8168634d88d42230df3d476180f411b95853f636f9633dc7de4cb84e40c3aab5b9738e8949257455454fff8a4a7bf5fa6d231

  • C:\Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    5fba5ad46c8deb6046065a3005039f89

    SHA1

    b9a4b2ce0a315e633d61cff08b4ca4257f5ab3a7

    SHA256

    2f4ca4f82ec06ba2b4d14a0cf0a549011fe85ec0f33e2e07e2dc3c173ad45ad4

    SHA512

    9e3098f3fab6666fcd77c07696e8168634d88d42230df3d476180f411b95853f636f9633dc7de4cb84e40c3aab5b9738e8949257455454fff8a4a7bf5fa6d231

  • C:\Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    5fba5ad46c8deb6046065a3005039f89

    SHA1

    b9a4b2ce0a315e633d61cff08b4ca4257f5ab3a7

    SHA256

    2f4ca4f82ec06ba2b4d14a0cf0a549011fe85ec0f33e2e07e2dc3c173ad45ad4

    SHA512

    9e3098f3fab6666fcd77c07696e8168634d88d42230df3d476180f411b95853f636f9633dc7de4cb84e40c3aab5b9738e8949257455454fff8a4a7bf5fa6d231

  • C:\Windows\SysWOW64\smnss.exe

    Filesize

    70KB

    MD5

    30c3cc35f3803b6a57cdbe0739637435

    SHA1

    31af7aea3200dfe61f68c769c50959f93e63f0fe

    SHA256

    a2f6968aed7715b372bc28c3b11798f057e5538ff6e21732add396d3040ee078

    SHA512

    60d471fd28ed8b6f5a403def3d23c1b282cf422075fe1ece69a0e30c6ebae715ed8f61c63b307d2c1eafa3fb0ca39d30e942db982e3f85ffa296714e1ecb0627

  • C:\Windows\SysWOW64\smnss.exe

    Filesize

    70KB

    MD5

    30c3cc35f3803b6a57cdbe0739637435

    SHA1

    31af7aea3200dfe61f68c769c50959f93e63f0fe

    SHA256

    a2f6968aed7715b372bc28c3b11798f057e5538ff6e21732add396d3040ee078

    SHA512

    60d471fd28ed8b6f5a403def3d23c1b282cf422075fe1ece69a0e30c6ebae715ed8f61c63b307d2c1eafa3fb0ca39d30e942db982e3f85ffa296714e1ecb0627

  • memory/3348-26-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/3348-22-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/3868-44-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3868-48-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3868-56-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3868-54-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3868-35-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/3868-52-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3868-37-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3868-38-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3868-50-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3868-42-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3868-40-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3868-28-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3868-46-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3868-39-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/4620-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4620-13-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/4620-21-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4620-24-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB