Analysis
-
max time kernel
139s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21/04/2024, 19:09
Static task
static1
Behavioral task
behavioral1
Sample
186175fb87651491e873e4c0c457fefec2d7816695082e49b3d19f0d86969892.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
186175fb87651491e873e4c0c457fefec2d7816695082e49b3d19f0d86969892.exe
Resource
win10v2004-20240412-en
General
-
Target
186175fb87651491e873e4c0c457fefec2d7816695082e49b3d19f0d86969892.exe
-
Size
127KB
-
MD5
1fa494e8434955d18130b4bbba317ff6
-
SHA1
09cea54b74ab5f4e123c04be8c07cee5e0e26afe
-
SHA256
186175fb87651491e873e4c0c457fefec2d7816695082e49b3d19f0d86969892
-
SHA512
b77bd63618f84f9e5e2999df737de03128192a7d72f1c0cf375c0b494ac755b7a3864cce92ee62ba64bd92a85d9777d3b7a7f3d486aa1f5dc490b14eda57eaea
-
SSDEEP
3072:9OjWuyt0ZHqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPL:9IH9OKofHfHTXQLzgvnzHPowYbvrjD/O
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 11 IoCs
resource yara_rule behavioral2/memory/1892-0-0x0000000000400000-0x0000000000421000-memory.dmp UPX behavioral2/files/0x000500000002326f-10.dat UPX behavioral2/files/0x00090000000233ea-15.dat UPX behavioral2/memory/1892-18-0x0000000010000000-0x000000001000D000-memory.dmp UPX behavioral2/files/0x000300000001e970-20.dat UPX behavioral2/memory/2252-24-0x0000000000400000-0x0000000000409000-memory.dmp UPX behavioral2/memory/1892-23-0x0000000000400000-0x0000000000421000-memory.dmp UPX behavioral2/memory/1892-21-0x0000000010000000-0x000000001000D000-memory.dmp UPX behavioral2/memory/3448-30-0x0000000000400000-0x0000000000421000-memory.dmp UPX behavioral2/memory/3448-36-0x0000000010000000-0x000000001000D000-memory.dmp UPX behavioral2/memory/3448-39-0x0000000000400000-0x0000000000421000-memory.dmp UPX -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x000500000002326f-10.dat acprotect -
Executes dropped EXE 2 IoCs
pid Process 2252 ctfmen.exe 3448 smnss.exe -
Loads dropped DLL 2 IoCs
pid Process 1892 186175fb87651491e873e4c0c457fefec2d7816695082e49b3d19f0d86969892.exe 3448 smnss.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ctfmen = "C:\\Windows\\system32\\ctfmen.exe" 186175fb87651491e873e4c0c457fefec2d7816695082e49b3d19f0d86969892.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ctfmen = "C:\\Windows\\system32\\ctfmen.exe" smnss.exe -
Maps connected drives based on registry 3 TTPs 6 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 186175fb87651491e873e4c0c457fefec2d7816695082e49b3d19f0d86969892.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 186175fb87651491e873e4c0c457fefec2d7816695082e49b3d19f0d86969892.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\1 186175fb87651491e873e4c0c457fefec2d7816695082e49b3d19f0d86969892.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum smnss.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 smnss.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\1 smnss.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ctfmen.exe 186175fb87651491e873e4c0c457fefec2d7816695082e49b3d19f0d86969892.exe File opened for modification C:\Windows\SysWOW64\grcopy.dll 186175fb87651491e873e4c0c457fefec2d7816695082e49b3d19f0d86969892.exe File opened for modification C:\Windows\SysWOW64\satornas.dll 186175fb87651491e873e4c0c457fefec2d7816695082e49b3d19f0d86969892.exe File created C:\Windows\SysWOW64\smnss.exe smnss.exe File created C:\Windows\SysWOW64\ctfmen.exe 186175fb87651491e873e4c0c457fefec2d7816695082e49b3d19f0d86969892.exe File created C:\Windows\SysWOW64\shervans.dll 186175fb87651491e873e4c0c457fefec2d7816695082e49b3d19f0d86969892.exe File created C:\Windows\SysWOW64\grcopy.dll 186175fb87651491e873e4c0c457fefec2d7816695082e49b3d19f0d86969892.exe File opened for modification C:\Windows\SysWOW64\shervans.dll 186175fb87651491e873e4c0c457fefec2d7816695082e49b3d19f0d86969892.exe File created C:\Windows\SysWOW64\smnss.exe 186175fb87651491e873e4c0c457fefec2d7816695082e49b3d19f0d86969892.exe File created C:\Windows\SysWOW64\satornas.dll 186175fb87651491e873e4c0c457fefec2d7816695082e49b3d19f0d86969892.exe File created C:\Windows\SysWOW64\zipfi.dll smnss.exe File created C:\Windows\SysWOW64\zipfiaq.dll smnss.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\PowerPivot Excel Add-in\tracedefinition130.xml smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\gu.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\tr.txt smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsnor.xml smnss.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Blue.xml smnss.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.onenotemui.msi.16.en-us.xml smnss.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.wordmui.msi.16.en-us.xml smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\cy.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\lv.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\zh-phonetic.xml smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols.xml smnss.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\Welcome.html smnss.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Consolas-Verdana.xml smnss.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.excelmui.msi.16.en-us.xml smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\Alphabet.xml smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsnld.xml smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsrus.xml smnss.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.common.16.xml smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\es.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\mk.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\mng2.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\th.txt smnss.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.officemuiset.msi.16.en-us.xml smnss.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.PowerView.PowerView.x-none.msi.16.x-none.xml smnss.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Paper.xml smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\si.txt smnss.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\THIRDPARTYLICENSEREADME-JAVAFX.txt smnss.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-00C1-0409-1000-0000000FF1CE.xml smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\ku.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\vi.txt smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav.xml smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipscat.xml smnss.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Garamond.xml smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\pt.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\ServiceWatcherSchedule.xml smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main.xml smnss.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.powerpointmui.msi.16.en-us.xml smnss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\LyncBasic_Eula.txt smnss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\WordNaiveBayesCommandRanker.txt smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsen.xml smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipssrb.xml smnss.exe File opened for modification C:\Program Files\Java\jdk-1.8\jmc.txt smnss.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-001B-0409-1000-0000000FF1CE.xml smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\ca.txt smnss.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AppXManifest.90160000-0115-0409-1000-0000000FF1CE.xml smnss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\ClientPreview_eula.txt smnss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\ClientVolumeLicense2019_eula.txt smnss.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Red.xml smnss.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\CT_ROOTS.XML smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\it.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\tk.txt smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\oskmenubase.xml smnss.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\Green Yellow.xml smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\fy.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\uk.txt smnss.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Century Gothic-Palatino Linotype.xml smnss.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.Proof.Culture.msi.16.es-es.xml smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\az.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\nb.txt smnss.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.Excel.Excel.x-none.msi.16.x-none.xml smnss.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2160 3448 WerFault.exe 89 -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\InprocServer32 186175fb87651491e873e4c0c457fefec2d7816695082e49b3d19f0d86969892.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 186175fb87651491e873e4c0c457fefec2d7816695082e49b3d19f0d86969892.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 186175fb87651491e873e4c0c457fefec2d7816695082e49b3d19f0d86969892.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED} 186175fb87651491e873e4c0c457fefec2d7816695082e49b3d19f0d86969892.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\InprocServer32\ = "C:\\Windows\\SysWow64\\shervans.dll" 186175fb87651491e873e4c0c457fefec2d7816695082e49b3d19f0d86969892.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\InprocServer32\ = "C:\\Windows\\SysWow64\\shervans.dll" smnss.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3448 smnss.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1892 wrote to memory of 2252 1892 186175fb87651491e873e4c0c457fefec2d7816695082e49b3d19f0d86969892.exe 88 PID 1892 wrote to memory of 2252 1892 186175fb87651491e873e4c0c457fefec2d7816695082e49b3d19f0d86969892.exe 88 PID 1892 wrote to memory of 2252 1892 186175fb87651491e873e4c0c457fefec2d7816695082e49b3d19f0d86969892.exe 88 PID 2252 wrote to memory of 3448 2252 ctfmen.exe 89 PID 2252 wrote to memory of 3448 2252 ctfmen.exe 89 PID 2252 wrote to memory of 3448 2252 ctfmen.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\186175fb87651491e873e4c0c457fefec2d7816695082e49b3d19f0d86969892.exe"C:\Users\Admin\AppData\Local\Temp\186175fb87651491e873e4c0c457fefec2d7816695082e49b3d19f0d86969892.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\ctfmen.exectfmen.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\smnss.exeC:\Windows\system32\smnss.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3448 -s 17244⤵
- Program crash
PID:2160
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3448 -ip 34481⤵PID:1732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD53d49e4cd750c8d80e6e3eca34cf1992c
SHA1f0a2b6dfe4728d4b9b25614947b867530237e434
SHA256f722256f66bc988bb9330f6afc37ef4c3abf6bc719a35e58691dc75c23758391
SHA51219c33c8d86032a85167b5a2cd54e4074878ace7fa2c779fb67f59f7cb54f06547cb1b5ec997be8916c9abc42f614415e9d35a922922484117bb3ead9e08014bb
-
Filesize
127KB
MD5e0a401aebc19809b9f61ee6d6ac8000a
SHA1b1b98825eb1d4dbd5abc91f973ad8d2541c1ae1f
SHA256986e334a2c78cc07321773e247d608b6b0e2308524992119de4af6e66d5dffbf
SHA512beecd4e732c68944f41f99db420b138e86c414016255a10d05f38d240a8397d581db4cde5ccb1a5b3f21b74735dd13ca9a1f1333ce2b5d54b44dfb494f00826f
-
Filesize
183B
MD511f824890bf0c5dc1bc41fb7e6af5a25
SHA152850bff782913e92e208926bc6815ffe49389f8
SHA256de83b035213981aa21b4f8cdb077d72c6f2a9c87e1b7d835eec3aee77d3afae1
SHA512875e1b1aa8db5cb57ee6daba62f78b58cf2c9b5339249e5b56098e282632ffcf12b02487dfd91895ef1fe46e7457eb567d4caec0c15235ae0b18d2de10e3c264
-
Filesize
8KB
MD5ce661e91a5c743197de6ea3faf755e4a
SHA1bd4306413dc70c36d39f087323bc2b5b8db1178f
SHA2561451d76bce27535b7dbaadf2f64eece6db3df35dc4d4b300cc021f112cbba30e
SHA51263ed36550128566753e09cd3bd4108feeb70a7964dc292e35696f82c17216592380b58c9ca4dce938123d6b3fb5466df04e24749619b9a4d2efaa1f4e317fc69