Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-04-2024 04:56

General

  • Target

    f11546565905781b7f2d7363bbe61f45ceaef25384fc0cebb00ccc1bb267509e.exe

  • Size

    41KB

  • MD5

    35005decb9b3a244cd91f57242f327fd

  • SHA1

    db45317bfb459044d3440d533e9c69a78a056d63

  • SHA256

    f11546565905781b7f2d7363bbe61f45ceaef25384fc0cebb00ccc1bb267509e

  • SHA512

    4d2567fc694859e9577e7fae147f0f1056f25d6b04d4e703b13be99395ab921e1b74c8d6941412fec60805af616c4f5abf9aca976e6813bef42f9039cc45e7ee

  • SSDEEP

    768:VeMc5VwWt1jDkbXdnTOyQxHFO+IxX2P5LIbbcPYir2lAqcdF0i09Cy:Vq5VwWDjDkdTRqHFOn8tIbbeYiuZIFSz

Score
9/10

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 11 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f11546565905781b7f2d7363bbe61f45ceaef25384fc0cebb00ccc1bb267509e.exe
    "C:\Users\Admin\AppData\Local\Temp\f11546565905781b7f2d7363bbe61f45ceaef25384fc0cebb00ccc1bb267509e.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4296
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3760
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:3700
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3700 -s 1348
          4⤵
          • Program crash
          PID:3204
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3700 -ip 3700
    1⤵
      PID:1608

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\ctfmen.exe

      Filesize

      4KB

      MD5

      76d3a939d05f206cd55a9d7aeb90a930

      SHA1

      a84490c6fe724ac6e00788b3ef4756c6f6e2926d

      SHA256

      3d1976a9e1a57c80acd5aa59eb9e2036694fecc584022ee5b14cf7aeab838777

      SHA512

      f0814c5d7aa441c519ebd9e37dbeb6d7d315078f855fe566a7293262ca2fe2c52020c5a8e7c9c489a894a0d82b8a625333d447514d608df8808daccafd484b8c

    • C:\Windows\SysWOW64\grcopy.dll

      Filesize

      41KB

      MD5

      9a01014bfec516a434e238114d2fd7f8

      SHA1

      7f8a0dabf5a78814030b5783a8b244585e5f83f1

      SHA256

      8eab392351f0c3c1b2bf99572af5cd4de82b8b065d1279797aac4e776970d565

      SHA512

      24eb17f0c266273b67df776789895e1c4205b84bb4fdf7f6abda8afb6240472c1709a4b013b5a023292ff85121678ff26fa4a0f9f7ed29c449a305174ac6c509

    • C:\Windows\SysWOW64\satornas.dll

      Filesize

      183B

      MD5

      3a9e4576d49fdf723909790bd40f315f

      SHA1

      01e276b2e1d587684392d109aed31537f5a90e5f

      SHA256

      1ab80106569f9119df89491ff022ff03b624f7ec264d2b653913d00890c53ad4

      SHA512

      99f19d51f8a294579fc623c0024a8ccf41cab3fc846eaa02afbe45e6be80ff1393bb0d2b35daa61acbe35b631b9b79f83e2637626d27bf400c4e1989fbd38ab7

    • C:\Windows\SysWOW64\shervans.dll

      Filesize

      8KB

      MD5

      1226994d48d792ff9d1de38acaecb9e9

      SHA1

      a050c509d039d83a297a3d25b4b825612f60ab92

      SHA256

      e2fb5994baf014d228f31c76026e647ee5339a53d558ddf89a2432a71089f4aa

      SHA512

      0cc0a0e979163d676ca90fb93001ddee4872d21b6b1ebe6f0a0b855bac8d887e658830bb596ba92b3709fb3fbcfa4b60f593dcfb5289a8601b8d79c75d4fde94

    • memory/3700-29-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/3700-36-0x0000000010000000-0x000000001000D000-memory.dmp

      Filesize

      52KB

    • memory/3700-37-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/3760-25-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/4296-0-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/4296-18-0x0000000010000000-0x000000001000D000-memory.dmp

      Filesize

      52KB

    • memory/4296-21-0x0000000000400000-0x000000000041F000-memory.dmp

      Filesize

      124KB

    • memory/4296-24-0x0000000010000000-0x000000001000D000-memory.dmp

      Filesize

      52KB