Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    156s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/11/2023, 18:49

General

  • Target

    0a8f5146230480acdd40edc03d1574bbff7ef4388e1fc44ddac5e1fdd8cf7c4c.exe

  • Size

    118KB

  • MD5

    bb8c3055d4d73512c2faab4449601a90

  • SHA1

    12d9b881e6e83a1a16874bb5e6b2068e9fd50da4

  • SHA256

    0a8f5146230480acdd40edc03d1574bbff7ef4388e1fc44ddac5e1fdd8cf7c4c

  • SHA512

    f0e38c42e8780eaa62eed5c2fd5499adf1f609ecaa431a0fb3564a00284f1d57fc0db46ea0db131b60db2099b901b5f2afb7afe2064bd15b6d54b130d90254c1

  • SSDEEP

    3072:XOjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPb:XIs9OKofHfHTXQLzgvnzHPowYbvrjD/m

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 3 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a8f5146230480acdd40edc03d1574bbff7ef4388e1fc44ddac5e1fdd8cf7c4c.exe
    "C:\Users\Admin\AppData\Local\Temp\0a8f5146230480acdd40edc03d1574bbff7ef4388e1fc44ddac5e1fdd8cf7c4c.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1484
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:5060
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:1920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    1365efa5facb18b9f08476331020f8ce

    SHA1

    f3e74376e925f82f36f0674885526d0f1adc6df4

    SHA256

    97c1d7b4de842d1031ad5051b323925c63345f9a2bd7975e2088fd279782ed57

    SHA512

    4e4eb745561f82600288af959ddde4450932ed41ce868f31c92035e967208fedf7af169bbbb2ae20a8576b89d65a38b84d2cf61077d5e5ac37e6db653a40a78e

  • C:\Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    1365efa5facb18b9f08476331020f8ce

    SHA1

    f3e74376e925f82f36f0674885526d0f1adc6df4

    SHA256

    97c1d7b4de842d1031ad5051b323925c63345f9a2bd7975e2088fd279782ed57

    SHA512

    4e4eb745561f82600288af959ddde4450932ed41ce868f31c92035e967208fedf7af169bbbb2ae20a8576b89d65a38b84d2cf61077d5e5ac37e6db653a40a78e

  • C:\Windows\SysWOW64\grcopy.dll

    Filesize

    118KB

    MD5

    e99701f45459f23587f3f0248e508f07

    SHA1

    33e1c6bace4eb0ab928dc8ace8f5a4d191643410

    SHA256

    c674b769f1ba6ac2fb27c9f60189993cf9085073757ea0d46646a93f16b30d89

    SHA512

    033c811caad19759f8bbae3e4f200b744fe78ebcd25485c3e62027f9dfc4e1e34465df62698d6877d3a9a5bb9bc84316acbcfa40c6a63deeeaa58b1630d3e8e0

  • C:\Windows\SysWOW64\grcopy.dll

    Filesize

    118KB

    MD5

    e99701f45459f23587f3f0248e508f07

    SHA1

    33e1c6bace4eb0ab928dc8ace8f5a4d191643410

    SHA256

    c674b769f1ba6ac2fb27c9f60189993cf9085073757ea0d46646a93f16b30d89

    SHA512

    033c811caad19759f8bbae3e4f200b744fe78ebcd25485c3e62027f9dfc4e1e34465df62698d6877d3a9a5bb9bc84316acbcfa40c6a63deeeaa58b1630d3e8e0

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    5bdb8b12714b14eb455f95bb6ee757bf

    SHA1

    fbfcad081f802b47c4d7d1a664c52ecfe6926a33

    SHA256

    3fa874d21eefb3ba40df1e99ecdef9f3a53e6d190f446cfeb3e9b927f4a811f4

    SHA512

    6e4a3d28932e78c6c1e193c08c0ab045d22b378565abcac85b0ba175ad7fa890eba2df2e5406661808e425c65b91ca6d0c1c3a0aa088a8f09fbf6f8dc305589b

  • C:\Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    e1efdcb29bf29e822df1383138e85a34

    SHA1

    bae2c9bfacee021c10112e23ff5d23fd86a68853

    SHA256

    cdad4387721c44b35f260afca5042872aab7cdd703fb1cc2571461789c249664

    SHA512

    f2c198e73a818b01ac0efb7ccc3df0a60230553ac7531bc5f7bae250e7bbef67b524faa27c4ee64a2fb75a1d00640e9f44241f60eda94a8d95d733a47de498e3

  • C:\Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    e1efdcb29bf29e822df1383138e85a34

    SHA1

    bae2c9bfacee021c10112e23ff5d23fd86a68853

    SHA256

    cdad4387721c44b35f260afca5042872aab7cdd703fb1cc2571461789c249664

    SHA512

    f2c198e73a818b01ac0efb7ccc3df0a60230553ac7531bc5f7bae250e7bbef67b524faa27c4ee64a2fb75a1d00640e9f44241f60eda94a8d95d733a47de498e3

  • C:\Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    e1efdcb29bf29e822df1383138e85a34

    SHA1

    bae2c9bfacee021c10112e23ff5d23fd86a68853

    SHA256

    cdad4387721c44b35f260afca5042872aab7cdd703fb1cc2571461789c249664

    SHA512

    f2c198e73a818b01ac0efb7ccc3df0a60230553ac7531bc5f7bae250e7bbef67b524faa27c4ee64a2fb75a1d00640e9f44241f60eda94a8d95d733a47de498e3

  • C:\Windows\SysWOW64\smnss.exe

    Filesize

    118KB

    MD5

    e99701f45459f23587f3f0248e508f07

    SHA1

    33e1c6bace4eb0ab928dc8ace8f5a4d191643410

    SHA256

    c674b769f1ba6ac2fb27c9f60189993cf9085073757ea0d46646a93f16b30d89

    SHA512

    033c811caad19759f8bbae3e4f200b744fe78ebcd25485c3e62027f9dfc4e1e34465df62698d6877d3a9a5bb9bc84316acbcfa40c6a63deeeaa58b1630d3e8e0

  • C:\Windows\SysWOW64\smnss.exe

    Filesize

    118KB

    MD5

    e99701f45459f23587f3f0248e508f07

    SHA1

    33e1c6bace4eb0ab928dc8ace8f5a4d191643410

    SHA256

    c674b769f1ba6ac2fb27c9f60189993cf9085073757ea0d46646a93f16b30d89

    SHA512

    033c811caad19759f8bbae3e4f200b744fe78ebcd25485c3e62027f9dfc4e1e34465df62698d6877d3a9a5bb9bc84316acbcfa40c6a63deeeaa58b1630d3e8e0

  • memory/1484-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1484-28-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1484-25-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/1484-12-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/1920-27-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1920-36-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/1920-39-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/5060-24-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/5060-21-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB