Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    20/04/2024, 21:33

General

  • Target

    44edb77aee3ac624087da610d4c2cbdebf9b232d6ce7741baa5a1193f414fdae.exe

  • Size

    352KB

  • MD5

    116e39d1fa5785f1e42573a165eeb8e8

  • SHA1

    64d5f585bc674228edb01da68dc49318ea0d001e

  • SHA256

    44edb77aee3ac624087da610d4c2cbdebf9b232d6ce7741baa5a1193f414fdae

  • SHA512

    0102a7eaecd12443198e599194e1ddc42d572e571c662357fec586b2236093d7a5ecdeb1e5efa6640cb7a8e8c765df6307a026a0b88298af24d3a27a8df2dd84

  • SSDEEP

    6144:ZIs9OKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPFsEPAsKCe8i:gKofHfHTXQLzgvnzHPowYbvrjD/L7QPs

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 11 IoCs
  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\44edb77aee3ac624087da610d4c2cbdebf9b232d6ce7741baa5a1193f414fdae.exe
    "C:\Users\Admin\AppData\Local\Temp\44edb77aee3ac624087da610d4c2cbdebf9b232d6ce7741baa5a1193f414fdae.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2728
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2676
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:2516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    bf2114d62032fb2617c66109a0d3f39c

    SHA1

    e63450677db5e7ff33a67d6c5e24ae3688923821

    SHA256

    cb2509e3902655cfcdf1af64eef32bccfaae96289a57bebb43a07f9cb0df9974

    SHA512

    4ebe16859ebe713cacac460f93687d5c737461406c734842133cf914275713b9d82c7d2c7c0dd39b02c99a1f69751d3b1e326f8ba5815fe93ee5e0f1d2839ae8

  • \Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    62c9bec68ec2cf7ba499e0413b23fe79

    SHA1

    04cc3387cf5d15323a5f83aeb5c3601914eea760

    SHA256

    252ea82f0d810a8c17dfcac3b202df5d8dcf9d55c29f045b23486c6f2b135394

    SHA512

    b515c8dfaf592a28fec9074f8910b2d600de9a0b4794cb461845548229085c32b4e72049647ff114a292387af1d7f6db4a9716ec48e6052dfa1a456623a20bc4

  • \Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    c8a9318e4daefe57b81a1d31074ccb63

    SHA1

    ba51500ba66abb548ca4fdf701d0d3410b7139f9

    SHA256

    b8c085df6f123266ff0702f1a39f4c5947fe09daccbf2c50107aeaf7440e2d07

    SHA512

    cf554acf5eb3d3838db6c772a97db4bdaeba575a7e3d81301c83b1ba6cbcd8ffd876bb98548bce15bd3d9c3ce8150ed409354d1e6f3a2678e231d46aca91886f

  • \Windows\SysWOW64\smnss.exe

    Filesize

    352KB

    MD5

    c983aa8eb355b0f74724d107c61cbde6

    SHA1

    b855dc28119b281b0f327fcf9679d4d9edf4ac04

    SHA256

    0925aaa8e46d283f8e4092c230a15a7220899adb43c5a44b8cbaf1ba9138d992

    SHA512

    a978868bdc9bf697ea8b808192cee463aca910c252820596f8310a2b643e10e0ddb0a72c1b96043c307c3dfc756e5a3a8547eff2b2aab527b70aa3f0beb5f31d

  • memory/2516-45-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/2516-42-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2516-36-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/2676-28-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2676-31-0x0000000000320000-0x0000000000380000-memory.dmp

    Filesize

    384KB

  • memory/2728-18-0x0000000000340000-0x0000000000349000-memory.dmp

    Filesize

    36KB

  • memory/2728-27-0x0000000000340000-0x0000000000349000-memory.dmp

    Filesize

    36KB

  • memory/2728-26-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/2728-24-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2728-0-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/2728-14-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB