Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
11/05/2024, 02:21
Static task
static1
3 signatures
Behavioral task
behavioral1
Sample
c7413d1bcc52bc6a24ad5dbc9f1d2f8e38f607dcf8a65fe8b887d37bc7c65acd.dll
Resource
win7-20240508-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
c7413d1bcc52bc6a24ad5dbc9f1d2f8e38f607dcf8a65fe8b887d37bc7c65acd.dll
Resource
win10v2004-20240508-en
4 signatures
150 seconds
General
-
Target
c7413d1bcc52bc6a24ad5dbc9f1d2f8e38f607dcf8a65fe8b887d37bc7c65acd.dll
-
Size
8KB
-
MD5
97927023f52032529243dfe856098f02
-
SHA1
1c46856a17f437b9fef14ab2fac0baebafce79f2
-
SHA256
c7413d1bcc52bc6a24ad5dbc9f1d2f8e38f607dcf8a65fe8b887d37bc7c65acd
-
SHA512
0a257ae01e6d07a32737b1809b72f8ef3942e5dc9204986067f59963f99ae2620715cb978847251c3e5f7b585a7ea685efc4d1f12ffdd2f922037fa056b205cf
-
SSDEEP
192:f0h4SFyvWohE5xf6YUBSL63SUJqtMblWN:8O+ohE2B13NJqtM
Score
9/10
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule behavioral1/memory/2212-2-0x0000000010000000-0x000000001000D000-memory.dmp UPX -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ctfmen = "C:\\Windows\\system32\\ctfmen.exe" rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\satornas.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\satornas.dll rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1244 wrote to memory of 2212 1244 rundll32.exe 28 PID 1244 wrote to memory of 2212 1244 rundll32.exe 28 PID 1244 wrote to memory of 2212 1244 rundll32.exe 28 PID 1244 wrote to memory of 2212 1244 rundll32.exe 28 PID 1244 wrote to memory of 2212 1244 rundll32.exe 28 PID 1244 wrote to memory of 2212 1244 rundll32.exe 28 PID 1244 wrote to memory of 2212 1244 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c7413d1bcc52bc6a24ad5dbc9f1d2f8e38f607dcf8a65fe8b887d37bc7c65acd.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c7413d1bcc52bc6a24ad5dbc9f1d2f8e38f607dcf8a65fe8b887d37bc7c65acd.dll,#12⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2212
-