Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/04/2024, 19:09

General

  • Target

    1a31fc74a65516ba4e1179a940a7f8c9697582e67cac86fc162011bf3e4e8fa5.exe

  • Size

    75KB

  • MD5

    06890ebe5da0bc85749b8aa83235754d

  • SHA1

    abbf4c62447ecaa4e5c960365a2bc2068b6eff6d

  • SHA256

    1a31fc74a65516ba4e1179a940a7f8c9697582e67cac86fc162011bf3e4e8fa5

  • SHA512

    4858f931efc692333a20d083d609b9eea4320c344fc3cb06a75dd6d142ddeae8168f8ca894ea3b128a1fb41a1ff0b96a52fb4405e9d8eac5cd3549c70995150f

  • SSDEEP

    1536:rx1Qja7luy6y0s4sqfkbnAKBOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3v:1OjWuyt0ZsqsXOKofHfHTXQLzgvnzHP3

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 6 IoCs
  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a31fc74a65516ba4e1179a940a7f8c9697582e67cac86fc162011bf3e4e8fa5.exe
    "C:\Users\Admin\AppData\Local\Temp\1a31fc74a65516ba4e1179a940a7f8c9697582e67cac86fc162011bf3e4e8fa5.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4324
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:5004
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:1520

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    1c072c322904ddcdb5063def183cd080

    SHA1

    165d87c7f3d5ce3bea73e5bd1906565e5599580d

    SHA256

    5df7f406985fd9f0061049f0028260b7c2945418785862a8a251d78ad3408d24

    SHA512

    cbaf2d7a4abd31dcd8a6fa3e12cd61265e6b306c49735956aa5519041b11a2fbb37e9faa38541a0aa49fa61dab7c45d238defba94f2f41c565dc8da62c61c146

  • C:\Windows\SysWOW64\grcopy.dll

    Filesize

    75KB

    MD5

    7c870ae03bc36d8c6daf53424be0c1da

    SHA1

    a6ad3d9ec67cc94eafe5d0a2a5cbc2a51655c3f5

    SHA256

    9c0b6444ace1132005cfd4ab6d4fefd96b150defe356baf8110fd4dfd77dd2be

    SHA512

    2bdd2bb07698bc76517cb60f2fa4a326d76fe9721d19dfdaf230b40d5ee6a2bccead803d4d361b416690c5ca3bc35e0b3d46097cf09f1e7d5ad30f4414c8b4ac

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    7b3b62451a49d0d50e6f91137e1fa032

    SHA1

    1eace087ac91cbf62170f75f4f7ec7ea043d8a58

    SHA256

    089d285a4e65179946c7de72c3d4cddb72581d3467049fd629bf26e33d99d639

    SHA512

    21f333b54dabef79a33acae0d9d9f22a5a63fcbf4c8bffd2c0545581c521cfcd6e60982b1c3c587d867119755d2c06026463726227d274dfad637e33f803d13e

  • C:\Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    468e00d40fb28a74aaf6681704a2ac3a

    SHA1

    d3414f7d01abc4adc72905dd4698ff33ec3ff4ba

    SHA256

    125f9bc0affaab053a0b4689b6a9be1d60bb5476ab94ea048c0f7580e6074045

    SHA512

    0fe5c8f8a91fd7f4d1a0259c142905d0ae948514288f09d73f250b36ca8af02a51ba492597447450d78d3d2b2a0f1f208b4a1236a6cec48195a7297367613689

  • memory/1520-47-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1520-43-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1520-61-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1520-59-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1520-34-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/1520-35-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1520-37-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1520-39-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1520-41-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1520-57-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1520-45-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1520-55-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1520-49-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1520-51-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1520-53-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/4324-17-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/4324-23-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/4324-20-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/5004-24-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB