Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/05/2024, 23:45

General

  • Target

    771234a03592f5c15e85cd2eef33d993bb61b957841cc62cbc69b6b474d98389.exe

  • Size

    240KB

  • MD5

    3b8204c94aaa3d5281ec1b5850bcf7f9

  • SHA1

    6d8526132b9aafc2877f29bac30feb4a55b7c57b

  • SHA256

    771234a03592f5c15e85cd2eef33d993bb61b957841cc62cbc69b6b474d98389

  • SHA512

    ea9963001ba90086f12a69e5f40a7c131dbacfb90a51ed22eb2ec8bca0bdce94b60ecb9bfb574c33f44839c74ba09f76874fd7123dc7d78a1a32fde7aaa54be3

  • SSDEEP

    1536:iq5VwWDjDkdTRqHFOn8tIbbeYiuZIFS9bB:iq5ud9qHFO8Kf3rIIbB

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 25 IoCs
  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\771234a03592f5c15e85cd2eef33d993bb61b957841cc62cbc69b6b474d98389.exe
    "C:\Users\Admin\AppData\Local\Temp\771234a03592f5c15e85cd2eef33d993bb61b957841cc62cbc69b6b474d98389.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1480
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2840
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:2272

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    aeb1c8ccad78de07e345c95be5c8fe4c

    SHA1

    7cdb724eca00ed333dcee48f3399c1a53a9017eb

    SHA256

    4e33ab02ab8d2c639cd34cbc77340e7fb325ad68179e776897395756971f95c9

    SHA512

    f9bf73e3a77e1cdf3c2ffb09a7d8a70b583961e05b5719e0865c517c95365501f60597b08fdb215864dcbeded4a61060d0f21deaddd26e4212a17c3a04a9311a

  • C:\Windows\SysWOW64\grcopy.dll

    Filesize

    240KB

    MD5

    7302ddff0d18ca2fe2959f0769e3814a

    SHA1

    915fb82d239f8d06dfe60b37764fae0a82f945f4

    SHA256

    44f6b0aaa377de48a685a60b6b41d6cddc4e9e22d55761ce4205cc4735bf2647

    SHA512

    4a56091f8d8b4c02f167d45a35b2142f3f9b2c9fd0e9f58ef019789616e821737556144f7e460d8ccf849b06a59b4b3a18ca0304c2e8de522ad7440494c56f6c

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    8e43397a68bd4e00465f00a6d4874bb6

    SHA1

    c0d060426f4ff322ebaa66d020e6d9203af1c09a

    SHA256

    fb4c7898aa13f5f8b163b3a36612ce531fdda8c2d6e54b6d332db602ac289c71

    SHA512

    784511923ea979708e00f4391d90706293b0a3b44c06cad46aa94efdccc066cccf74b70e5f48a6d468cb538782a11fd2fcf37ee23764081abb60e39a528c25e3

  • C:\Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    78fe75a5435a31d6dec0ea8727032237

    SHA1

    f65d5fe653e9df8c374974939595e3e1472b4ea5

    SHA256

    c497cfa8a45980b2f3843c98fb4680a84afe2c85fcb225cc0410456fb9272b75

    SHA512

    8f8fa4789aa00e1a5b5e843407a0542fa93066c16c73370c4dd90f3426b803ba27ddf55c9624c43b1e7cedecd0487a460892121df96de7320b8230e77c00e5f6

  • memory/1480-13-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/1480-24-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/1480-0-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/1480-23-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2272-52-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2272-50-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2272-66-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2272-39-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2272-40-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2272-42-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2272-44-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2272-46-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2272-48-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2272-31-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2272-64-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2272-54-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2272-56-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2272-58-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2272-60-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2272-62-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2840-26-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2840-30-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB