Analysis

  • max time kernel
    120s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/05/2024, 23:48

General

  • Target

    86fa6bd07087f16774328a8944a0eb7771d3868816bbe1503d6d1d9daa71fa36.exe

  • Size

    70KB

  • MD5

    514f151fef2051a1e0f97dd98e9a9f88

  • SHA1

    39849c53fbfb58dc31a6e15c76360ba6616a74aa

  • SHA256

    86fa6bd07087f16774328a8944a0eb7771d3868816bbe1503d6d1d9daa71fa36

  • SHA512

    942e919d1c8f0090f2549a39a3896180ca95828bbc80812d36b42b8d703188f70da2d6c239599db7d03e0b6bd3c39c70514471225edef59f300826133e3d6077

  • SSDEEP

    1536:Gq5VwWDjDkdTRqHFOn8tIbbeYiuZIFS9b1YTjipvF2a:Gq5ud9qHFO8Kf3rIIb1YvQd2a

Score
9/10

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 11 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Program crash 1 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\86fa6bd07087f16774328a8944a0eb7771d3868816bbe1503d6d1d9daa71fa36.exe
    "C:\Users\Admin\AppData\Local\Temp\86fa6bd07087f16774328a8944a0eb7771d3868816bbe1503d6d1d9daa71fa36.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1212
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:412
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:3304
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3304 -s 1512
          4⤵
          • Program crash
          PID:900
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3304 -ip 3304
    1⤵
      PID:3296

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\ctfmen.exe

            Filesize

            4KB

            MD5

            f389c20e9fee6595245f3b7b0481c3a1

            SHA1

            6a4fde92acb8e615a5d0563a1991e30387153ce8

            SHA256

            df0d29618bd35ff8e1f75a00f528550934bed8d422af89a7951178f498621975

            SHA512

            4d133c217c9f4c750bfd0c6ef1c3f65af7d8f15f1a57df23ede63275a89cf6e315930abcbf578e080ce222b37b3527ff2987d6cdf7ed6f932e86789e63383126

          • C:\Windows\SysWOW64\grcopy.dll

            Filesize

            70KB

            MD5

            83ffd6df5b4e8c77be9df9de86577edd

            SHA1

            c315e0363560de373447defff43b56e027f77c5f

            SHA256

            9666f77e1885e297b77fd9d52459565435df4b0f33522246fa5a19ce9d3689d8

            SHA512

            0a562b0e6ed9b719b4355cb825c0e025c8f016195bc1321894d3618ee10a77cbe4f761d02d21f25e427547924b65f1e64a26cd97db999b98d3c478dce5aa5c60

          • C:\Windows\SysWOW64\satornas.dll

            Filesize

            183B

            MD5

            50f1283e65b8b7114c1e19733354c61e

            SHA1

            c06d9d26791077b9ecc2c8d172af7a5ceeacfcb4

            SHA256

            9c2280dcf9945d0e476189e4810c08a9da7d7b870c05f4a2cc4bc6468aba3d7b

            SHA512

            e5447d177442b3d05bb66e6ceda25eb1501d4a9837ca746f5afb554ef073e118ab9ca6e2898f8ee9db45a13fb62b0b139119bceecef1ed71186eaebe12fb3a57

          • C:\Windows\SysWOW64\shervans.dll

            Filesize

            8KB

            MD5

            0891a707f1d5cd38b22ea7dd8f89121e

            SHA1

            6ded567ac915cacd530b67bda78833fb5fbb2fca

            SHA256

            1a2da98dcc939d67864780a18141fceead1247592b847c662ca9c899e2beaa08

            SHA512

            d9eee9b647bd0a639099ddb6e8a76f3316816874786cb42b963e9d196ced0bb39d64f20697127a63e15d13327a47d519956f0e27970ac32649f52d0ca2810908

          • memory/412-26-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/1212-0-0x0000000000400000-0x000000000041F000-memory.dmp

            Filesize

            124KB

          • memory/1212-18-0x0000000010000000-0x000000001000D000-memory.dmp

            Filesize

            52KB

          • memory/1212-25-0x0000000010000000-0x000000001000D000-memory.dmp

            Filesize

            52KB

          • memory/1212-23-0x0000000000400000-0x000000000041F000-memory.dmp

            Filesize

            124KB

          • memory/3304-31-0x0000000000400000-0x000000000041F000-memory.dmp

            Filesize

            124KB

          • memory/3304-38-0x0000000010000000-0x000000001000D000-memory.dmp

            Filesize

            52KB

          • memory/3304-39-0x0000000000400000-0x000000000041F000-memory.dmp

            Filesize

            124KB