Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    21-04-2024 22:14

General

  • Target

    5f0197caf08aa8065be325363429381bac4efd55a045b42d4e11022ddee13495.exe

  • Size

    118KB

  • MD5

    312d3cbe6a9271ccd3f83347fc32ff35

  • SHA1

    92e05ad1ab458a1bda12446fbfc940cbf9f8f3a7

  • SHA256

    5f0197caf08aa8065be325363429381bac4efd55a045b42d4e11022ddee13495

  • SHA512

    1f0c9197ea52ddedf3423b48022ed634775e2eb54499dd796b59fa8d2aed0dbdcc1afa162b72c54ba7b8201beed877948d230cf9bb6348e6cb725e98cb149048

  • SSDEEP

    3072:IOjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPb:IIs9OKofHfHTXQLzgvnzHPowYbvrjD/m

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 13 IoCs
  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f0197caf08aa8065be325363429381bac4efd55a045b42d4e11022ddee13495.exe
    "C:\Users\Admin\AppData\Local\Temp\5f0197caf08aa8065be325363429381bac4efd55a045b42d4e11022ddee13495.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2028
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:1704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\grcopy.dll

    Filesize

    118KB

    MD5

    94e544ac4ace0bfb0bf51fda41186c3c

    SHA1

    45afe8238533b1dfe1cc86199f9f0ce0794b9b01

    SHA256

    87ae9b1f0c1ce6a781fc887319f2e43dd6064721eefa5c0c36e5c63f41aab720

    SHA512

    49794be79efcc6cb5be6b96d2587d0eff663beff8f267fc8428e36b06570b4714170449cabd26f177303f1398de90e302f84f1d38966d898bd2342a0f27ce00f

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    4f65fa1677b4c47662e303ab5b421fb9

    SHA1

    53e14dd77c4fac8d1c3398d164b3cc14f46f2b92

    SHA256

    b04562539ea89cc16cc635c0c9b825a194cfe877c0d03c752b05da4a20ce49ee

    SHA512

    17f5cca3390e44cf8b504b03f200815596c5e2dd1032ae292116a7d4b19bb193c271a8362305bf944045266792bb10fcce0b4af7e8dfc279927c1ce1711a8349

  • \Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    c2cfd5a236166020b9b0da3c54f6128e

    SHA1

    205b1fe690f800f2058146f4b60990e3f1c674f0

    SHA256

    8b23bfd9c976a0aad80bd3c96e103226b2a188b1ef13b305b454c2a3ad4f024a

    SHA512

    badc96e33a642457426041cb8938f608385b816820b5df71cc23cf5acf5d8e78040c684eb7d578366c7700124cdd459f168e806f5e78127eff79a5fe44abcfa9

  • \Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    f91b6fab3fe2003d59cc5adcc3146823

    SHA1

    2bc3222e3c57f6d47bd8c00f25a45345dafeb5fe

    SHA256

    35f373189cdd87c0fa578a53e5ee02a5f6d56ed94c1b64c9cbb1edf90200bbb6

    SHA512

    81cece259d44614dc6158a446e99438c306d290f604712951c785667ab73c0053bbe8f7db8eeb1bc885affb1b8867a6bee73d49fea07cac0b1da58abd4af6e09

  • memory/1704-46-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1704-43-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/1704-42-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/1704-36-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2008-18-0x0000000000350000-0x0000000000359000-memory.dmp

    Filesize

    36KB

  • memory/2008-25-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2008-28-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2008-26-0x0000000000350000-0x0000000000359000-memory.dmp

    Filesize

    36KB

  • memory/2008-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2008-16-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2028-35-0x0000000000320000-0x000000000033F000-memory.dmp

    Filesize

    124KB

  • memory/2028-27-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2028-45-0x0000000000320000-0x000000000033F000-memory.dmp

    Filesize

    124KB