Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    21/04/2024, 03:10

General

  • Target

    d08c7d868b6f93df6263542b58afb2af56c51d223e7b293512585bdfc4717847.exe

  • Size

    41KB

  • MD5

    3ec9ad75005d7d0ba35f15c1cba18b94

  • SHA1

    5b116311fd73c4a84137fb3d40d78fb27add7f09

  • SHA256

    d08c7d868b6f93df6263542b58afb2af56c51d223e7b293512585bdfc4717847

  • SHA512

    02eb6f5b64657bed07f4b9c7c3aa6bc6f7aa17358552b517f0d6348b6f41e089a4a252145b7f22be1722e88dc9f88d2d015135f2b40a47fbdd1e9de1e5f13726

  • SSDEEP

    768:8eMc5VwWt1jDkbXdnTOyQxHFO+IxX2P5LIbbcPYir2lAqcdF0i09syp:8q5VwWDjDkdTRqHFOn8tIbbeYiuZIFSL

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 27 IoCs
  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d08c7d868b6f93df6263542b58afb2af56c51d223e7b293512585bdfc4717847.exe
    "C:\Users\Admin\AppData\Local\Temp\d08c7d868b6f93df6263542b58afb2af56c51d223e7b293512585bdfc4717847.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2620
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:2108

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\satornas.dll

          Filesize

          183B

          MD5

          7504f1ba114b0bcc8d4ea07b18ca0bc4

          SHA1

          9eb4c3462dd2b19e2a88dcf415d5c306f100f919

          SHA256

          0200a3ff3ffaa58cb5956464db82d52540097607be68557fbe7316d57960a7c5

          SHA512

          b90c424c7bbc1a668172f8b3cf2b3d95530a1e3eea20d05bc1e5e73b5fe4394de5be79a67b75981223c753298a86286e2755267daa0a003cbcc5b4f5a4b99939

        • \Windows\SysWOW64\ctfmen.exe

          Filesize

          4KB

          MD5

          fa3490b16830e29f2c4e27d55469b55a

          SHA1

          1ba9dc3189c6b014f7525211c0426a8a6d82097a

          SHA256

          bb3c5247ce07f53db54d2d36a9777b736b0a372a8f0f6a659ae715ef21e5d5c2

          SHA512

          d13d32f861ab2e124af413775e7ecd4a8ed055c4efcc4b153ec5c1a2a7546ab29b9d893877e5f55d8a008575a1d2b6cac53dcba54ad067c0e6f65f4af02a8be4

        • \Windows\SysWOW64\shervans.dll

          Filesize

          8KB

          MD5

          12b0b62de71e1e56fac67716b9016c7a

          SHA1

          620b360bdd8f4493718ddd667b6dcfb5726a9612

          SHA256

          023c8a414c2ad2d344d07671eb8e83f089f0e19d43ecd318b5cc56c3d309510b

          SHA512

          f302d26dae2bba140052052a7e0965dc3dc4be8997100b189cdfaf6961ea27e2a6a6bc988b80b1588b8ba8b18c1eebfa5f24ab8201373633110339a051726cf9

        • \Windows\SysWOW64\smnss.exe

          Filesize

          41KB

          MD5

          d9954cef3c1c40e5b56c5fe16f69c36b

          SHA1

          6e00b3aff7d818f6353d4449b8765becc62b076a

          SHA256

          ae47fbba831b11d57aa1435dfe4e7802262c124a76ad89d458e16c50e97f3106

          SHA512

          8644137d88c94f04a7da1e7ace7d6b50f01777536f0058aa0eaea864281a3a236f5ed4f68c7018e67771c4327419edf7fd49fc42c654ffb39413242d548f5c62

        • memory/1736-15-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB

        • memory/1736-18-0x0000000000340000-0x0000000000349000-memory.dmp

          Filesize

          36KB

        • memory/1736-25-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/1736-33-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB

        • memory/1736-0-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2108-43-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB

        • memory/2108-58-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2108-40-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB

        • memory/2108-68-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2108-42-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2108-66-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2108-44-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2108-46-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2108-48-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2108-50-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2108-52-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2108-54-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2108-56-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2108-38-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2108-60-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2108-62-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2108-64-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2620-37-0x0000000000320000-0x000000000033F000-memory.dmp

          Filesize

          124KB

        • memory/2620-26-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB