Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-04-2024 20:28

General

  • Target

    334250dc8b9eb735a57895dd33e8ed26aff426a39f880062be71cea475dc11c6.exe

  • Size

    119KB

  • MD5

    61d1ce1394a03e9888be992eb836f1c8

  • SHA1

    e8a0a43358742522d6ee2e86983c99fc8ff60cc2

  • SHA256

    334250dc8b9eb735a57895dd33e8ed26aff426a39f880062be71cea475dc11c6

  • SHA512

    05cf347c79f56fb9a45e37c01a1c2c7efb644b171412f57b0b86ce14ef8f92cbb26e3327f921d7300483f749dadc398acfa05daba1dc3d78fb31bda6102ac411

  • SSDEEP

    3072:TOjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPh:TIs9OKofHfHTXQLzgvnzHPowYbvrjD/E

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 12 IoCs
  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\334250dc8b9eb735a57895dd33e8ed26aff426a39f880062be71cea475dc11c6.exe
    "C:\Users\Admin\AppData\Local\Temp\334250dc8b9eb735a57895dd33e8ed26aff426a39f880062be71cea475dc11c6.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4024
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:4112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    f8bc38374725025097c52078fa1b2bdb

    SHA1

    284a849e0a0f5cf05d86a5f2e0169a00eeb102b3

    SHA256

    aa92fe52104ace722d5d5d3653e1c968f268661fdfa977e18705c88ae0bbeb13

    SHA512

    d733f74053f6913343331a9b90eb82be4b229e4e4e4fb24626c9ef191f9182468dc023e0e3906f729bc3d8bfad628bf0319d41da8c4c8798bc079e3efa096cfc

  • C:\Windows\SysWOW64\grcopy.dll

    Filesize

    119KB

    MD5

    7e495108bcd99d8181bff51bb9fc1f1d

    SHA1

    60a90f1d30631dcc93efe9e0240b66c59aa515ec

    SHA256

    9fc2afeae1d6ad01d6321fb0a1299d99b07e77b463801eeef2f439729d979ee1

    SHA512

    11548d381e3129aac701fe4f17c64cbb0bf78a52dcb191e16b47e38f5c97534c6011caadbb19d3b652123799620bba12d26768c6a72d581b0b771a3d14e05207

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    1a54aafc945f2938e98b040a381eb52e

    SHA1

    1a9e6d5c407bf5f0cd953dcdbfe7c78a73dd57c8

    SHA256

    c6ddfbc72055a62478b3c03e3374e133740d7751a7e52e5fe5e95e39afd03046

    SHA512

    a107889fe1c0af9f2b6111602a66c5896d80ae36ed0926ce123bb3defbb21e263c3b8a1794cb824a777ded998cbe776cbfd41fd383af0a875f552ed8ba821ba3

  • C:\Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    f0c97a0431783c2ed581a79cbb08b357

    SHA1

    b1914f3e5d88d58f71c7e7af33b81d0818e3da7f

    SHA256

    edee02350fc443df426516b059d28eaf1b4649a85a581aba457ae3a83429d17e

    SHA512

    57b674cb58a00595d970379d61a4bbecaf95b78b0c6be613e93be991fce0b96eb145ce69c0aa92ab5dcd70469f18e5d5a5c68f959839c0980d4385f4879ed971

  • memory/1976-23-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/1976-22-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/1976-0-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/1976-18-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/4024-26-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/4112-28-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/4112-35-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/4112-37-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/4112-39-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB