Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    07/05/2024, 20:48

General

  • Target

    416911e14cd3c99785cab3b5222a2cff9d08e199a9b0d045fe62283967fcb189.exe

  • Size

    41KB

  • MD5

    43c61ca50d504badd6e95301f2ff5395

  • SHA1

    266cbb5a89d9e3fc3858d6646ff36843a1cdfd8d

  • SHA256

    416911e14cd3c99785cab3b5222a2cff9d08e199a9b0d045fe62283967fcb189

  • SHA512

    e6b1bd732d4ebbb9a08b5fcdab84a77965baf9c738f32afb19866fdc97a599905c8326077b6be48687b2b744ca956d1ad5fbda4ff04fb38ce60cf9e37de4847f

  • SSDEEP

    768:SeMc5VwWt1jDkbXdnTOyQxHFO+IxX2P5LIbbcPYir2lAqcdF0i09Cy:Sq5VwWDjDkdTRqHFOn8tIbbeYiuZIFSz

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 24 IoCs
  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\416911e14cd3c99785cab3b5222a2cff9d08e199a9b0d045fe62283967fcb189.exe
    "C:\Users\Admin\AppData\Local\Temp\416911e14cd3c99785cab3b5222a2cff9d08e199a9b0d045fe62283967fcb189.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2592
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2616
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:2412

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    2ce66d9bef3409236821b2a349d59bd6

    SHA1

    1557ecf21482bdea9b4dd44d4a6cce354aa68651

    SHA256

    9f93f4cd7651d2740cd873e24dcae2bcacf2f7d10b531fd17ef4cae72fcb1bf7

    SHA512

    0b3453b5cf31527b4cc931d2ac14ebf242e441a0732b843623dcbe157d7961b9779499cb43b522a7d8fa275d3513cef66955fc62146709a128a9da23047bf867

  • C:\Windows\SysWOW64\grcopy.dll

    Filesize

    41KB

    MD5

    05b9a7c7a56811a8c74e86a4262cc15d

    SHA1

    86da34f3a03990a6656d301966315e4ad9144ee6

    SHA256

    0df5acf3ba7e12d20d187f316222b03b3666997fa8d682d47fef41e926ce2625

    SHA512

    8b6279c01b32b9cd714cfab42bb268efa780ecc1d615d442e8f1d43c12c84ebe1950a08e9524cca6196630fa6297ecbfb3e2ffb65eecb53807a8f112c7e4ec1d

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    cc28565ba6ed39443670edaa3a19b428

    SHA1

    ef5eb4f63bb0631ee8a237c4148ecbd3df1d5155

    SHA256

    93a1048953912f943f91e23bc5d7d41102ac3a7637424046455a36d936e30cce

    SHA512

    9764e31b3e96745ced87b9aa6e52fd376716f1747b64efb2674dafa59f00392c344f1017f1eb21244d508e105730cbcb03c39010bc098acc18f43b5eab8c8dda

  • \Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    aaf7eb74037efe22d5bd8b727fe83277

    SHA1

    085d50d65893c58891f5322f90b34b8b81115fd7

    SHA256

    742942a30a8a8a52817a16dee2d66cf083c156298e4d599c260e8dffbb6bd790

    SHA512

    348d9357e1255c93b2fc6657d05e421b94a01abde89f198d962e1f8dc8efd2aef06fea6b3d2c6ab1effed284aaae02e92924798dda0c3bc05bae3a829783beb3

  • memory/2412-57-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2412-61-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2412-69-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2412-67-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2412-65-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2412-63-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2412-39-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2412-42-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2412-43-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2412-45-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2412-47-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2412-49-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2412-51-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2412-55-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2412-59-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2592-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2592-16-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2592-18-0x0000000000340000-0x0000000000349000-memory.dmp

    Filesize

    36KB

  • memory/2592-27-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2616-30-0x0000000000320000-0x000000000033F000-memory.dmp

    Filesize

    124KB

  • memory/2616-31-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB