Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/05/2024, 01:42

General

  • Target

    06d0e74b4e856739cc74a3add81c8ca0.exe

  • Size

    118KB

  • MD5

    06d0e74b4e856739cc74a3add81c8ca0

  • SHA1

    f6ec6a8e020ceacf5262d03dd51718a113c6a79b

  • SHA256

    4bf6d517a069c5dc79c306c3c45aa52205c0314f6e5c8971737808719fe94dcb

  • SHA512

    c71bc54e40eb9e7de308fb11cf5d766cf72f7fd1162576313a0abeefeaa177f064066d7aa61cd8d64c52282e38b835665c6a2bf3262c53b05434d6d0144b218b

  • SSDEEP

    3072:gOjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPo:gIs9OKofHfHTXQLzgvnzHPowYbvrjD/h

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06d0e74b4e856739cc74a3add81c8ca0.exe
    "C:\Users\Admin\AppData\Local\Temp\06d0e74b4e856739cc74a3add81c8ca0.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4212
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:864
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:4436

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    0d987f7f767c1b57c427c29cf95baad9

    SHA1

    1762762e39f5bc341e91b017520f0b6e70f935b2

    SHA256

    86220f0ce17d01e96c8c801c8f118b71ab7996374dc523c2354ac7e855347cfe

    SHA512

    2361d3a8666a4c8060dbc4cd68ad9c0d1d3e2b709c27f9b3c0ac696794976b2a8cfed44e2664c97dd5c3342bcf5c0b989b09df2ab7a2e079aacab0d3a1b15dd5

  • C:\Windows\SysWOW64\grcopy.dll

    Filesize

    118KB

    MD5

    a798a70621e719ffe12c2efbacaa1047

    SHA1

    eae34c6e45d2f29dca69c6cfdbdf11734aa1f261

    SHA256

    61d2b3183c174cf1baae073e8d1ce4125b6964cf016184a63e396406bd20c80a

    SHA512

    84ee7628179d44c53b1896fb2330681028d4a2c833a7a28eeba96d686cd2bf1dc9304dbdd4e7bfb191333566baec0df1d18fea61a027526603cb58251e297aa0

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    c6e0cb84b7d5440f6d30dfa19b1036c2

    SHA1

    f0c3e06a8d404f16153cec540505aa2ddd56baaa

    SHA256

    aa1555774408e8ba03dfcd775d33b92988fccbd8dd03335cc65472d4734c08de

    SHA512

    0caae77f00c4699f34fa2bbc39d49288aa3bb47292da544d8f6381ed366ee9a257d3987d7ce3da57f3487f49db63b45fbf422a23a2147a3e9735ae1e2d5c8343

  • C:\Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    51cbe2ad97eaba3169130f889b7ba434

    SHA1

    a8d92eba0e648c56eae3e346f296379f67386d22

    SHA256

    ec3fbbf2d3b3f9c6b1ad5b60955d553e66cc95d234c719def080fb66dfc117dd

    SHA512

    571841ec315edf2d02bb708b5b9becc4df3b2c32942b3377e743cdde5706898eb1d6abd0d175a48a319e1ed019ba86e3a33d3040e2e24bf2fb5a5e366592defa

  • memory/864-25-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/4212-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4212-16-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/4212-24-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/4212-22-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4436-29-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4436-37-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/4436-40-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB