Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/03/2024, 00:21

General

  • Target

    bc0dd5537314ee0c7e37b1be741823c82e4ec4ae124334581dfd805903a032fe.exe

  • Size

    119KB

  • MD5

    ee2611f461aa92da3490032426012086

  • SHA1

    6ee02260d83675f18fb862177adf97da45339fec

  • SHA256

    bc0dd5537314ee0c7e37b1be741823c82e4ec4ae124334581dfd805903a032fe

  • SHA512

    1f9ead56b64947d1c6cabf9a02b50d23f374fed52e5a3899ce3b814ba568fb454c27bd2e4ab90b198a265494a73bed9c36fcdf3da69e0e39565581efe9a76122

  • SSDEEP

    3072:WOjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPh:WIs9OKofHfHTXQLzgvnzHPowYbvrjD/E

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 11 IoCs
  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc0dd5537314ee0c7e37b1be741823c82e4ec4ae124334581dfd805903a032fe.exe
    "C:\Users\Admin\AppData\Local\Temp\bc0dd5537314ee0c7e37b1be741823c82e4ec4ae124334581dfd805903a032fe.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4968
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1648
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:4788

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\ctfmen.exe

          Filesize

          4KB

          MD5

          e3cd4ed5d5c10f9c0bf31db5be4fe13e

          SHA1

          690b40a4e983396e3cdf9a2c19a58cbc9ff4aab1

          SHA256

          740be56c5c81836fe3fec76f9177128b7fc1a3e6f74032a81f6fd91639a238d0

          SHA512

          b23a7bf83d03b55ce0d8380b4ab03525543597cea62c230ac6dfad3dcf9f328302eddf77c6e1d97e7e759c10ea7f30c6970b7bef157af135dc9440ebf810ec02

        • C:\Windows\SysWOW64\satornas.dll

          Filesize

          183B

          MD5

          73fec559d3e895c7aac011d41f2107e2

          SHA1

          b00b724e231e839ebb0ad3b6dc261c3124a4cc81

          SHA256

          69534a26a9b0a1980ccbfde5667a24a2c1984dcefad441d0f4200f42e5fac944

          SHA512

          816652a025c9cd249ea54cbb3360b79422a117a122f3ed79fdfd0df23a1249da4a8a68261408d2a423dd2db6dc1019b6fcec92212df33f19c9b2a9f6ded81ad1

        • C:\Windows\SysWOW64\shervans.dll

          Filesize

          8KB

          MD5

          c430c65d6b78dc6ebfab09296c349ab8

          SHA1

          e92bf0ee99ae944829bc96d377ba8e54ef6648c8

          SHA256

          eca620887b3d461d1292257741859c23323463845fecc0ddc06ab3078be5fa68

          SHA512

          36e1847160625bb7c63edee069e903dedcb3a3d2118b49c4176a631a8f5289be5e51aa51f344a6e92ca9cc0a7a3b4f924f8d889b61c32b7c17a0aae0adf26171

        • C:\Windows\SysWOW64\smnss.exe

          Filesize

          119KB

          MD5

          386b21ce08e7fcf18e9b9a504b30c488

          SHA1

          2da3d91dfb42bd2fa0780eafd08f0eb725f48396

          SHA256

          b85174c490cc2184ca20132812e00598026ecd9dfdd463a1f6e68643ecc35da1

          SHA512

          3a66a97afcdbf57e3945524cbcc000947ad239f1a5806f393da163543829418f2ed343c0b30c1734099e0376209c1a5340950d33064d36673ac35a1bcc9e94d4

        • memory/1648-26-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/4788-30-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/4788-36-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB

        • memory/4788-39-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/4968-0-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/4968-13-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB

        • memory/4968-21-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB

        • memory/4968-23-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB