Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    21-04-2024 22:07

General

  • Target

    5c0ccfa3f2549f3bf8a89f297cde37fbca4435fc92a871e2c11c8459432a6368.exe

  • Size

    41KB

  • MD5

    257bad0e1a2942e80648ce87030800a6

  • SHA1

    8c8ef6b9a89d71c485ce248a9f0c187d65132f31

  • SHA256

    5c0ccfa3f2549f3bf8a89f297cde37fbca4435fc92a871e2c11c8459432a6368

  • SHA512

    04d6390ad0df528432bdb9c987bed5daf1f538960fc4c95232318d38a2d35d1e0800c3b07f311b0761b2d7aba873082033125ca4063ac469c7c1cc11fe8d5086

  • SSDEEP

    768:KeMc5VwWt1jDkbXdnTOyQxHFO+IxX2P5LIbbcPYir2lAqcdF0i09Cy:Kq5VwWDjDkdTRqHFOn8tIbbeYiuZIFSz

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 26 IoCs
  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c0ccfa3f2549f3bf8a89f297cde37fbca4435fc92a871e2c11c8459432a6368.exe
    "C:\Users\Admin\AppData\Local\Temp\5c0ccfa3f2549f3bf8a89f297cde37fbca4435fc92a871e2c11c8459432a6368.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1256
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:2560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\grcopy.dll

    Filesize

    41KB

    MD5

    5b8af645ec1577a7728c1e39585c5622

    SHA1

    b9536a3177fb876da538cf4bf399b86ef54529b4

    SHA256

    ce5fb635461ba9cc5270383d0a19574c562ef00ca5c574607fa38ee16e492737

    SHA512

    fa309395b2eed09c95379f3061b04fe9c73dadbd0d8e0ada71625d50d0f66fe8986e1471221d909b0cc370cf1e0db7d4886f226cf461a4bfdfa8b24ab3a6eb65

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    e8edfc5eed6844473a6dd3820e432262

    SHA1

    045e39c2ea3b8dbe35c44c69bef7248f12d9a3a0

    SHA256

    287142051e13ce2ed3a43f9d691b53a324d08fff509a7d1889a9954fc8a5111f

    SHA512

    b49f65d955c7b40d275f8dbc627fbd29f3230c7b89eb4ffaaf5821d086e59197e9510905ff4017ce1609d0a1ac41d6f4c834c7f0f1333134fceb58dd76665c73

  • \Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    f9d375754f28c9ea5930a75ef984f8c8

    SHA1

    2e89ad3259131292dc0f1a953e31bd8b56659e93

    SHA256

    8eae1635dfb7dc81cd54b06c9ed54aa4640404cb6cca1bf7743dae18d6970619

    SHA512

    72bef4ca7555ea4619b75de126e294ce884e3b032e279aeb3129252a455d99816036b115577bc6d79c0250da25bd55f9cf65cbe2dae07b844dd11488571122e8

  • \Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    44b51a85e4e5b2e7a0c415ca70a01a02

    SHA1

    fff56b3ff44f1c3137b3f57f2b0bb89397a03be1

    SHA256

    48eab44256067bc950a737921a2e7f5c02b1ca8b2a8e8400da22b0f6143b45a9

    SHA512

    676ec81c94339002380bb73b6b19a89bfbaeba2a705ebd4302161e3cfdf567d2c01d6677e9189364dc7e51a833879f3ea5230f790ddd4d162ca3a4fd73088f26

  • memory/1256-45-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/1256-26-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2132-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2132-25-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2132-18-0x0000000000340000-0x0000000000349000-memory.dmp

    Filesize

    36KB

  • memory/2132-28-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2132-16-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2560-46-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2560-55-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2560-43-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2560-40-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2560-34-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2560-47-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2560-49-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2560-51-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2560-53-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2560-41-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2560-57-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2560-59-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2560-61-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2560-63-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2560-65-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2560-67-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2560-69-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB