Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/03/2024, 02:57

General

  • Target

    bc4ef06e40a3d73ce35f361d3a2e365f8eb88f5fc5b07d653bf20ff1b5c34202.exe

  • Size

    127KB

  • MD5

    13cee777aadedf3a6b3a7fc83455f9be

  • SHA1

    5bfb0649aa20b5e7ed2c1a76b606968afd33384a

  • SHA256

    bc4ef06e40a3d73ce35f361d3a2e365f8eb88f5fc5b07d653bf20ff1b5c34202

  • SHA512

    3e283bc98fa71091c721276971d2928916a443a9f3a9a83e6925e267b37239a07482095f29192bea392e5d478904ce5e449a03cd00c6c99ce52d667531a6fa7d

  • SSDEEP

    3072:vOjjuAt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPp:vzu9OKofHfHTXQLzgvnzHPowYbvrjD/s

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc4ef06e40a3d73ce35f361d3a2e365f8eb88f5fc5b07d653bf20ff1b5c34202.exe
    "C:\Users\Admin\AppData\Local\Temp\bc4ef06e40a3d73ce35f361d3a2e365f8eb88f5fc5b07d653bf20ff1b5c34202.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4000
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4800
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:4520

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\ctfmen.exe

          Filesize

          4KB

          MD5

          0ac8981623fa2fd8364c36fe4b87ad1a

          SHA1

          d7409146db32d8fb07ca3a70eb1b2a02e979f34b

          SHA256

          1a696d07f8baf585fa901ab357258e3c96462ac89f2c193fc163a128c2330a0b

          SHA512

          86ca0f32a70cb2b88e96c5a8c4cb6aaf6aea4341ba4af7c9e8e64487aba566f7296ca229d937757b1fc0a11d9e7cb813c1fa80aca452868317403bb28f9658d5

        • C:\Windows\SysWOW64\grcopy.dll

          Filesize

          127KB

          MD5

          949ac170b8e24481695e13a3a0e504e6

          SHA1

          6dc68a9fa34f2985fb8242056e293afd317e75c2

          SHA256

          ad1db64e141051c4d72c7a6d6f7e31bc8fdb33329b19ccb625ffeb6e548406cc

          SHA512

          c88ef2ff8d813d3818a9165977979c7d537ef966011ffeea7c1cb401a762fcf31bba29cb8089b482da8ba2b4956631ede041ddb2dfc009e6ed9ba7467bda4621

        • C:\Windows\SysWOW64\satornas.dll

          Filesize

          183B

          MD5

          05eb821271ff50dd04bd64ff57d9bcc7

          SHA1

          878f383d01b2123510abf96bbb37ad4459c1c573

          SHA256

          749b9a182f64dc19d0cbe4d4646c1c94855fdea1b8c7ed6dff131e2313151303

          SHA512

          263a137960326204181785afaa7feaedeb047fed03e7ea74b5ebd09c532fd67340382c18870e2d80d246ee8c808deb3b2c6d5999161e27aff452dec9489ae205

        • C:\Windows\SysWOW64\shervans.dll

          Filesize

          8KB

          MD5

          c5be387ce6b97c8b480b2267c124d3ce

          SHA1

          92634f5723a1387ac26d61165ae94c79ed33dc9b

          SHA256

          18c75b9267804ed6088a7d1ec50d844a6429bf88d8473cf9aa97648658339c1a

          SHA512

          fc0022180347dc2dd59adcdf533e358a11bf6690716e6c8e5ddd237d5ec086ad892822e032a77ff2dc46a875142f05051a0c0546f55b7f8895cda2fc9c05106c

        • memory/4000-0-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/4000-12-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB

        • memory/4000-24-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/4000-21-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB

        • memory/4520-28-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/4520-36-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB

        • memory/4520-39-0x0000000000400000-0x0000000000421000-memory.dmp

          Filesize

          132KB

        • memory/4800-23-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB