Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/05/2024, 22:49

General

  • Target

    58ba12e6966fa940dc20e19cc7e8b7c28e8266ef9e9e192d4bfb82f9e8fdd494.exe

  • Size

    75KB

  • MD5

    2396fa26b10aa216662ca8545954ddea

  • SHA1

    082325cd57e15c2a44fd8f0ea9947ecdd2165d03

  • SHA256

    58ba12e6966fa940dc20e19cc7e8b7c28e8266ef9e9e192d4bfb82f9e8fdd494

  • SHA512

    e57508ee546e0a443bbdf5bdf3f9197db046b2f0d0a5d5c888754e2624b2942e8187a94784d6a4a4456716cf6df2b9e04b31fe2e3ba0ad02dfe080bd9812e691

  • SSDEEP

    1536:cx1Qja7luy6y0s4sqfkbnAKBOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3s:UOjWuyt0ZsqsXOKofHfHTXQLzgvnzHPE

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 7 IoCs
  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\58ba12e6966fa940dc20e19cc7e8b7c28e8266ef9e9e192d4bfb82f9e8fdd494.exe
    "C:\Users\Admin\AppData\Local\Temp\58ba12e6966fa940dc20e19cc7e8b7c28e8266ef9e9e192d4bfb82f9e8fdd494.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3180
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4484
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:1908

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    b86f1ca5fe7c4873a529e17ce78db2c4

    SHA1

    35c47450ca8b78fdfbb421a62424ff62f6bda90a

    SHA256

    e82efe052b7f173ee2035679e1e43e7f45bed8e80ddf7fa328a51c03fff23308

    SHA512

    327a72982c4a5cbf1ec384bd6d9941c6a8e1f7b48edace652e49b13390c5e9dec40e30f35b3674f36583b72d9a1c38232c907244310578f5fcd3c570f34729eb

  • C:\Windows\SysWOW64\grcopy.dll

    Filesize

    75KB

    MD5

    16dbccb42acf3e21ed8fa218b1c761c4

    SHA1

    494b57bc793f6d628051cc67d203e40faed767cf

    SHA256

    6eec57799214bf0f731ca082e0b297fe03a4786ebfd570bede192db54906482f

    SHA512

    dba3a2f1a7216e7ad97a4ce9f2d568ee7c803d90add6183b34725adf37b01e834b9f5873c0298531022614d72c19e7bf543866c20a927b7c0d43d2db5ea92b66

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    b4261e8eb53c31c45a6ab3d23b842340

    SHA1

    ec5b0f349fd79bbcd2940518caab4f8fd42643e3

    SHA256

    0412624cf43d5b18be53786f51465771a8dddea47476da7b0db210466c906ab9

    SHA512

    281e7b697e9075f156fdb0a425fbf29f78e01796a32ee5702b620ff21fed0ab61b35e5ac15ad69125ae978b32e6f9de376deb0fc0bc66fe6f9eefe7469cf3e0b

  • C:\Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    3f3fd1f5cfe0fbcff3246c45ee640040

    SHA1

    98edfaaeba4ba3e7a02d42e2c54abeb53035cf81

    SHA256

    17467a097fe057472ae5195daeb8b583154f61826bbba854cf6ce2e69c6119d4

    SHA512

    b19a55c4e95a3ab4b4a0769c79334de8c8eeb5fbdf5b09f111548a7401f8f5ba21ad19c8771573c9d1322bbf3d238a35d1c47b2e8cf7e2161efc3e41711c4dde

  • memory/1908-53-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1908-43-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1908-63-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1908-61-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1908-59-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1908-36-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/1908-37-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1908-39-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1908-41-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1908-57-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1908-45-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1908-47-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1908-49-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1908-51-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1908-55-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/3180-17-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/3180-23-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/3180-20-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/4484-24-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/4484-28-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB