Analysis

  • max time kernel
    144s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    22-04-2024 02:20

General

  • Target

    b7eef5d97d6b20e5619107b5bd25a745d49633aede7bd3afc58a2181e7637bea.exe

  • Size

    118KB

  • MD5

    0b49a269b9f3f3a7b542bc147c1e03ee

  • SHA1

    07f8977cb56940d209a01b0dd53ffa5acb67f5d3

  • SHA256

    b7eef5d97d6b20e5619107b5bd25a745d49633aede7bd3afc58a2181e7637bea

  • SHA512

    f7dc59cd7716f9c2459b6b4697488dc51e485d46fd8a6a24aff4e2a1dece7b7167240bfcfd802a37da937068eaa41ef3b89c5def44e1d807ce6d89fdc9d8a1e2

  • SSDEEP

    3072:bOjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPX:bIs9OKofHfHTXQLzgvnzHPowYbvrjD/M

Score
9/10

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 12 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b7eef5d97d6b20e5619107b5bd25a745d49633aede7bd3afc58a2181e7637bea.exe
    "C:\Users\Admin\AppData\Local\Temp\b7eef5d97d6b20e5619107b5bd25a745d49633aede7bd3afc58a2181e7637bea.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1888
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2504
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2680
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 840
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\grcopy.dll

    Filesize

    118KB

    MD5

    f3a8194c3c6d61889b031e85647365e6

    SHA1

    497353de88ee6249656ecd95966e86f9cc07ac4a

    SHA256

    2ede7d43cf41df6a2c3e7a1b3f206f423d19db0cfb65421d313dda2b5ea0c3d3

    SHA512

    b40340c11912e72e3c78e14ae075d59af8181e4639ba6792928b6aa67ac1b21098a53e0e0df4a270d7c28ccf55363ed7f9bf3623fb41e6cd6cf3a5e99b15dbd3

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    8aaaf6c2045ff4d1669a6333551db1b3

    SHA1

    828a5f61f7eb1b4c27cdf366f3f8f59953a01edd

    SHA256

    65301455c2c5a3683f192666d8f04953e4ad85233d3bded0f170893ddb9f48d0

    SHA512

    047229196eacdee622be7e7048dcf736474ae24d5003f9aa9d90ff95888ed6f41d19239960099736593206e027647f4aee5b6ee513491445ac9de4eb6cf211a4

  • \Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    cd331045854e21d343cfec5e1c5c200b

    SHA1

    f8f43a38e54ea0110636d58a25a843d5217a5335

    SHA256

    54ba9df5ec5b246b585ce95359b822f6ca6bb9286ceb1990e2a576fbb07d1dd1

    SHA512

    4f0aa4ad30eb4e7305ab825cbfd5bd3c181025757b4ec1c8411c486c212a588acebd066a2d46d0301eef170c39da62d3cdf2be196383f4d9343089882aec9127

  • \Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    1c950a9ac2ab442ebdab934c6da49843

    SHA1

    18d621505fc6e73b26ac71dab1c6b022c38c5909

    SHA256

    7cb95eeacb6493319be13e7f2380be4cbffd25a25618e8e74d0b8c4324189ea7

    SHA512

    b367f2afd3d6cfa1d7908bfd41d2f1f845872f249ef0c583c915a65106ffbc5f1b70b32d1b925b8c0af4695020a5fcd69f1a318d05c345607c4d9726dd7c3c28

  • memory/1888-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1888-18-0x00000000002B0000-0x00000000002B9000-memory.dmp

    Filesize

    36KB

  • memory/1888-25-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/1888-26-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1888-16-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2504-30-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2680-33-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2680-39-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2680-45-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB