Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/05/2024, 20:41

General

  • Target

    40ffebd262bb77d535a39e6a4742d3c4efe4439f4938c8e118162d9755c05c54.exe

  • Size

    240KB

  • MD5

    53ac69de65ef26cf1b3b7d90214a2f6a

  • SHA1

    0b15ee11a859e349ed25fc2664ff819bf9875c57

  • SHA256

    40ffebd262bb77d535a39e6a4742d3c4efe4439f4938c8e118162d9755c05c54

  • SHA512

    b7006aaceac939ea9250a5b3519065c3556808d841c85301de2681efdfe0aa794a951ae30741a28bba3522e5f1e3120286a360a47595a83fc59e47b89b68a786

  • SSDEEP

    1536:cq5VwWDjDkdTRqHFOn8tIbbeYiuZIFS9bB:cq5ud9qHFO8Kf3rIIbB

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 25 IoCs
  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\40ffebd262bb77d535a39e6a4742d3c4efe4439f4938c8e118162d9755c05c54.exe
    "C:\Users\Admin\AppData\Local\Temp\40ffebd262bb77d535a39e6a4742d3c4efe4439f4938c8e118162d9755c05c54.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:728
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3752
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:2220

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    8fde7f3c003d0419c8172ed40be8ecfd

    SHA1

    2eb30d2fe43a729585b34ca6d8adbea91c0cbdab

    SHA256

    dca01fdcb44f9dacd35a6470d0cf0c275da1886df897bcd72711ebf5187a9314

    SHA512

    e13afdee24c9f37eac3568f19b1118972b22095492748fa2c0cf764386af49de9a8e0020d403c7480c9df8ba74206f36222f8b57b994055594105857f828eb8b

  • C:\Windows\SysWOW64\grcopy.dll

    Filesize

    240KB

    MD5

    a2e3873a931bc0c7872593abc9e29722

    SHA1

    ea502f050c6a38f5287b92a01f9f3377bd823376

    SHA256

    1ea71c59641937653710b0859bd6c7c71248f363897115bc6267b5fe3b0b7ee6

    SHA512

    ca107f49f6c653588acb7c1eae4f2851a91cf492c3688a37ca1d1d98274ba38005fbbd8909588dd54a29069d6ab6ed7e78c551a7d7e80e0c8bd6e6dc128641de

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    62475d7f5a72a33c32fc9121c7672f5b

    SHA1

    b882736a8432161883e72505db115cef0889bcfc

    SHA256

    df97b45b07af7aa0f5cdf8df612c9c0b5008f15a93667bbb47eb6d722c9e4d0b

    SHA512

    7ddfe9b5783e9e446051a3d7cd641826616daf15d91465d3169865f22b406ab79fac1dbc6a7ffba8637691f51996867a1e95170a9540bf72a6da6a0572e165aa

  • C:\Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    eeef331c25c7ad5dde29056efa6c7236

    SHA1

    bb8f546803f10281d16ec05d41a1d3183782e43c

    SHA256

    26c826531f54663c308c015f811d06b8c3f0321dafb010a327904cc6a5cc103b

    SHA512

    688552ce14a4d90a2b227e7655ee0fbbc1964dd805fdb83b260a76ae04fd8b88760e9f002b5dfd1e9a659b184ba9d3d9704e8c1f7e78a378bb13659b01e0d776

  • memory/728-16-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/728-25-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/728-24-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/728-0-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2220-40-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2220-50-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2220-66-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2220-39-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2220-64-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2220-42-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2220-44-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2220-46-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2220-48-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2220-32-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2220-52-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2220-54-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2220-56-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2220-58-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2220-60-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2220-62-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/3752-26-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/3752-29-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB