Analysis

  • max time kernel
    149s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    04/11/2023, 08:57

General

  • Target

    NEAS.ceab83e5b0a4a857b126a834051b9db0_JC.exe

  • Size

    239KB

  • MD5

    ceab83e5b0a4a857b126a834051b9db0

  • SHA1

    86aaf90698888a47f824252e66387811d7f8edf1

  • SHA256

    5a1820aa9d8f7bcc6bf9e05220b7440c51c32229d259f3f33ce93d1f83ad3a60

  • SHA512

    84f56e534c8316d58e6b09057ca2547641d374d8181d1ef8943829cbedbba1e94f1d2bae2bc57348834ec397dbc0bb03a44eb7ec3f137fb14b8478bb7533e61c

  • SSDEEP

    1536:gtq5VwWDjDkdTRqHFOn8tIbbeYiuZIFS9bc:gtq5ud9qHFO8Kf3rIIbc

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 3 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NEAS.ceab83e5b0a4a857b126a834051b9db0_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NEAS.ceab83e5b0a4a857b126a834051b9db0_JC.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2876
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2024
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:2764

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\ctfmen.exe

          Filesize

          4KB

          MD5

          a31855693b730037e731ec7e957b81b1

          SHA1

          fa5e968534166d9ee6d8200ca2707d4b1078fb3c

          SHA256

          e6939f1dd2d9f19309f046139b6dc7e23f2bd81313dfee42f0a5f38d746ab5f8

          SHA512

          902c619b4b6bd536e582c3468455c18d494867fcde56264d13bce27dc68924bfe50beee3d2b28d2c96c7e49ff5bb9d75c0a459dd7bda4c6bee7826760628bbaa

        • C:\Windows\SysWOW64\ctfmen.exe

          Filesize

          4KB

          MD5

          a31855693b730037e731ec7e957b81b1

          SHA1

          fa5e968534166d9ee6d8200ca2707d4b1078fb3c

          SHA256

          e6939f1dd2d9f19309f046139b6dc7e23f2bd81313dfee42f0a5f38d746ab5f8

          SHA512

          902c619b4b6bd536e582c3468455c18d494867fcde56264d13bce27dc68924bfe50beee3d2b28d2c96c7e49ff5bb9d75c0a459dd7bda4c6bee7826760628bbaa

        • C:\Windows\SysWOW64\grcopy.dll

          Filesize

          239KB

          MD5

          e3162fe6affc9f4b40bc66b50d432028

          SHA1

          2da5e162fc603058a89697bbbbd700125af11f2b

          SHA256

          a4130bce5ff4b279ed16c08e976c2499914a05ca64885592c647c15a5cdd0bac

          SHA512

          6af9b3a0d7cf2518d8ba62826331e08551ab578c2c386f3f1df1adbdc33e60aacca315835f758bad5bb988a7a66f09576f0e964631435085cd9c761b3a4838f8

        • C:\Windows\SysWOW64\satornas.dll

          Filesize

          183B

          MD5

          419484c3d4a5dbc3a0febf0bf07dd35d

          SHA1

          4599ffd72c44537db6b940d75f07ae0652b8952f

          SHA256

          3b69694b492825b0820d2184362500252c9c73dd1fd747f343f3ed7a814e9a52

          SHA512

          348b5853822fc534bdb0d05e3cdd06856d8220169c4ff8579f52bbe6e155cb16485063e800affec1fb513d10c07564bb9a8ba07523d41652626e0b8ef1309c31

        • C:\Windows\SysWOW64\shervans.dll

          Filesize

          8KB

          MD5

          67c1e23e9031ed1224befa66a3add70a

          SHA1

          8d63f63fcdd6cc516ab203b107e7c638fb9a9051

          SHA256

          2994e4fac27e813a2de7a714a3e2f0c5892e3b38c38c2f79ccbeea072558060f

          SHA512

          1d8dbd7d8d22ca42b0852ae4a5ffde9bf4e6573483594d909407a21971fcbbee185e9fae414d33dff8aa6b9e3e86e4ff842c912773fd3d76a864403b8c139e00

        • C:\Windows\SysWOW64\smnss.exe

          Filesize

          239KB

          MD5

          e3162fe6affc9f4b40bc66b50d432028

          SHA1

          2da5e162fc603058a89697bbbbd700125af11f2b

          SHA256

          a4130bce5ff4b279ed16c08e976c2499914a05ca64885592c647c15a5cdd0bac

          SHA512

          6af9b3a0d7cf2518d8ba62826331e08551ab578c2c386f3f1df1adbdc33e60aacca315835f758bad5bb988a7a66f09576f0e964631435085cd9c761b3a4838f8

        • C:\Windows\SysWOW64\smnss.exe

          Filesize

          239KB

          MD5

          e3162fe6affc9f4b40bc66b50d432028

          SHA1

          2da5e162fc603058a89697bbbbd700125af11f2b

          SHA256

          a4130bce5ff4b279ed16c08e976c2499914a05ca64885592c647c15a5cdd0bac

          SHA512

          6af9b3a0d7cf2518d8ba62826331e08551ab578c2c386f3f1df1adbdc33e60aacca315835f758bad5bb988a7a66f09576f0e964631435085cd9c761b3a4838f8

        • \Windows\SysWOW64\ctfmen.exe

          Filesize

          4KB

          MD5

          a31855693b730037e731ec7e957b81b1

          SHA1

          fa5e968534166d9ee6d8200ca2707d4b1078fb3c

          SHA256

          e6939f1dd2d9f19309f046139b6dc7e23f2bd81313dfee42f0a5f38d746ab5f8

          SHA512

          902c619b4b6bd536e582c3468455c18d494867fcde56264d13bce27dc68924bfe50beee3d2b28d2c96c7e49ff5bb9d75c0a459dd7bda4c6bee7826760628bbaa

        • \Windows\SysWOW64\ctfmen.exe

          Filesize

          4KB

          MD5

          a31855693b730037e731ec7e957b81b1

          SHA1

          fa5e968534166d9ee6d8200ca2707d4b1078fb3c

          SHA256

          e6939f1dd2d9f19309f046139b6dc7e23f2bd81313dfee42f0a5f38d746ab5f8

          SHA512

          902c619b4b6bd536e582c3468455c18d494867fcde56264d13bce27dc68924bfe50beee3d2b28d2c96c7e49ff5bb9d75c0a459dd7bda4c6bee7826760628bbaa

        • \Windows\SysWOW64\shervans.dll

          Filesize

          8KB

          MD5

          67c1e23e9031ed1224befa66a3add70a

          SHA1

          8d63f63fcdd6cc516ab203b107e7c638fb9a9051

          SHA256

          2994e4fac27e813a2de7a714a3e2f0c5892e3b38c38c2f79ccbeea072558060f

          SHA512

          1d8dbd7d8d22ca42b0852ae4a5ffde9bf4e6573483594d909407a21971fcbbee185e9fae414d33dff8aa6b9e3e86e4ff842c912773fd3d76a864403b8c139e00

        • \Windows\SysWOW64\shervans.dll

          Filesize

          8KB

          MD5

          67c1e23e9031ed1224befa66a3add70a

          SHA1

          8d63f63fcdd6cc516ab203b107e7c638fb9a9051

          SHA256

          2994e4fac27e813a2de7a714a3e2f0c5892e3b38c38c2f79ccbeea072558060f

          SHA512

          1d8dbd7d8d22ca42b0852ae4a5ffde9bf4e6573483594d909407a21971fcbbee185e9fae414d33dff8aa6b9e3e86e4ff842c912773fd3d76a864403b8c139e00

        • \Windows\SysWOW64\smnss.exe

          Filesize

          239KB

          MD5

          e3162fe6affc9f4b40bc66b50d432028

          SHA1

          2da5e162fc603058a89697bbbbd700125af11f2b

          SHA256

          a4130bce5ff4b279ed16c08e976c2499914a05ca64885592c647c15a5cdd0bac

          SHA512

          6af9b3a0d7cf2518d8ba62826331e08551ab578c2c386f3f1df1adbdc33e60aacca315835f758bad5bb988a7a66f09576f0e964631435085cd9c761b3a4838f8

        • \Windows\SysWOW64\smnss.exe

          Filesize

          239KB

          MD5

          e3162fe6affc9f4b40bc66b50d432028

          SHA1

          2da5e162fc603058a89697bbbbd700125af11f2b

          SHA256

          a4130bce5ff4b279ed16c08e976c2499914a05ca64885592c647c15a5cdd0bac

          SHA512

          6af9b3a0d7cf2518d8ba62826331e08551ab578c2c386f3f1df1adbdc33e60aacca315835f758bad5bb988a7a66f09576f0e964631435085cd9c761b3a4838f8

        • memory/2024-42-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/2024-26-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/2764-53-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2764-47-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2764-69-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2764-67-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2764-39-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB

        • memory/2764-65-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2764-41-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2764-63-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2764-44-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB

        • memory/2764-43-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2764-45-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2764-37-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2764-49-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2764-51-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2764-61-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2764-55-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2764-57-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2764-59-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2876-24-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2876-27-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB

        • memory/2876-12-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB

        • memory/2876-0-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2876-18-0x0000000000340000-0x0000000000349000-memory.dmp

          Filesize

          36KB