Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 02:08

General

  • Target

    74b2a55f8ffa4044e75764b6aff22b9033d83b7869531b38bde4af0b1eea9fca.exe

  • Size

    75KB

  • MD5

    0ce5d27e4791e2f363e84c1128098510

  • SHA1

    9f7d049363bcb838f7c0700420c9c88be136a270

  • SHA256

    74b2a55f8ffa4044e75764b6aff22b9033d83b7869531b38bde4af0b1eea9fca

  • SHA512

    4f692d15acc91f98c67601982c850952c3bc9f467629314f3bbe59983a50ef3d30c8b01cd0a7f2ef1602ace52f3c582761d742ed05c85db481c08dc87f0a76c1

  • SSDEEP

    1536:Qx1Qja7luy6y0s4sqfkbnAKBOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3v:YOjWuyt0ZsqsXOKofHfHTXQLzgvnzHP3

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\74b2a55f8ffa4044e75764b6aff22b9033d83b7869531b38bde4af0b1eea9fca.exe
    "C:\Users\Admin\AppData\Local\Temp\74b2a55f8ffa4044e75764b6aff22b9033d83b7869531b38bde4af0b1eea9fca.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4844
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3260
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:5092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    bb74a900b88f72ddcc0bba88f8cb48ef

    SHA1

    e94adc090f741b941d6cc66e485ac133745e52b2

    SHA256

    8500e1b36d5235591d245ba6884ef51adfd548580b03d194f69e2fc51803cd45

    SHA512

    d21cf694e05d286ffdcff9ab2792cb6e9620e3a664a6ff44c8be0a513659a1ff133bd9d859614b29fe733924014a6b5bc05b3b55f362a9016f2e7ed2e7d57b27

  • C:\Windows\SysWOW64\grcopy.dll

    Filesize

    75KB

    MD5

    9ed238936bd38149742083b1daea4cf7

    SHA1

    10cd33ab26fdabb4bf0dfa0e7a837c1bb6588916

    SHA256

    5226408499debe206bd706f82413bd61eb656ef2533f99c605c9f0191b5ab62e

    SHA512

    5ed384df2600b7f1b0542118f8df1ff938233d4db0acc09d1e04c800ee3132eb020d89ef9cdce42a551de490c3584a83e60cd2381d1805ed8ef29970370afce4

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    8a64ea1523150f4ace31f554f1a697e7

    SHA1

    6ba62851a3160628971860ed3a8d0cce6e9204fc

    SHA256

    24dde67ed14050a484dd876e39e620f6e115f6aece8a01a72aebb74c765d7499

    SHA512

    d4cfdb4ca2c102f8d25c3578c16ccb80ac339e0cc157331586576be3eccffcdb90d0dd8f3c2c798f5d953e7f82cdfd2116d5e96900289f43656af318f4bc7bc1

  • C:\Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    260cd8a5cef78f0ed90c8c711affb4dc

    SHA1

    f06d9fa5ede912905fe6b9db6446583eab80e721

    SHA256

    78d638b5e51682e81ac7a8de687f3f3479e3c61f47f6c3db25bb711b7cb8b0ce

    SHA512

    bf3b8016936ef86dd67ac43d5e4ae4fb3c70feac835a803aceaf04caa1fa9a93edf55e091a3dae1e38d798a9791204338a79908d63d8624db06484c93af220a6

  • memory/3260-26-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/4844-17-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/4844-23-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/4844-20-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/5092-38-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/5092-48-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/5092-35-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/5092-40-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/5092-42-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/5092-44-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/5092-46-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/5092-36-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/5092-50-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/5092-52-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/5092-54-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/5092-56-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/5092-58-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/5092-60-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/5092-62-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB