Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/05/2024, 02:23

General

  • Target

    b51abb57dbf664830bd4bd4eee380d39529f81b4b4deb48428c39a26d7a73b6e.exe

  • Size

    195KB

  • MD5

    89dbb033962d392144fd81aee07f32fa

  • SHA1

    c9e60b2b4f29ebb32bf1af13080079e00bf1cc9d

  • SHA256

    b51abb57dbf664830bd4bd4eee380d39529f81b4b4deb48428c39a26d7a73b6e

  • SHA512

    8f62a1159f0acea49c39495d4415c29aa7f0a4aecb5a2c75b9b8561414091dd1e6fdea44d106a26a0f2b7443dbb492841f740506ff19adf4758d564274fce584

  • SSDEEP

    6144:hIs9OKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPFsEPAsKCyOW:YKofHfHTXQLzgvnzHPowYbvrjD/L7QPo

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 9 IoCs
  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b51abb57dbf664830bd4bd4eee380d39529f81b4b4deb48428c39a26d7a73b6e.exe
    "C:\Users\Admin\AppData\Local\Temp\b51abb57dbf664830bd4bd4eee380d39529f81b4b4deb48428c39a26d7a73b6e.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4056
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1764
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:1460
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3452,i,16710585221322798697,8586257254049248207,262144 --variations-seed-version --mojo-platform-channel-handle=4132 /prefetch:8
    1⤵
      PID:4580

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\ctfmen.exe

            Filesize

            4KB

            MD5

            21406169adea463683329a08807f5c2b

            SHA1

            1c4d61162787b9a9680c304cf28da4d59d33b523

            SHA256

            709afee34d726f77ff30b39e628e5b2be5b3299e48b444cd61f389abcf20cec6

            SHA512

            e3d077b813ac07f2875cc577b88676b7c7d290ba7948d3a895e7c064929128b28057dd70366a57481e97672ec2b3119bb87b1b32c2e8e7badbebb04833773688

          • C:\Windows\SysWOW64\grcopy.dll

            Filesize

            195KB

            MD5

            bf0f5231e06e7e4b3652b754f99ac96d

            SHA1

            07de3a8bb46cc9cfc579b0c85a78671d2a5785d5

            SHA256

            854e30cf9876b7416832e73e1128e751ff21d3ab6d418ff432663915227f7658

            SHA512

            75a1689170f484e3eb47523289c2271cf37f94bcfc08eff100595be24eccadf9884eb9df630febbc25351d87b9eccbd6a7d067a6c005e77e6ec65f176c74c01b

          • C:\Windows\SysWOW64\satornas.dll

            Filesize

            183B

            MD5

            06951f25b96d4f96bf2f205001a47b5f

            SHA1

            d99d029af5cfe4effacf2718b58f9ab22a39f16e

            SHA256

            dd2cac51174a3e195effc68584003260674f17e368e08cebafb02578bd2fed36

            SHA512

            4c7fbc510116aa6b26ddef5b6259e474c18928f78c16284bc8d58d00c92870a607c490191aa755dff07e9d0f917ddd680dfc58e4448b19974bd537b07721edbe

          • C:\Windows\SysWOW64\shervans.dll

            Filesize

            8KB

            MD5

            f35668c7dfe0a577d8a33a9f778595b2

            SHA1

            03bb48e77443fbedb01942b3864a97b71fefd146

            SHA256

            8bbb42e0b0c9aa1b54c479c9f0317654d0cd4e20cb926e1f77bafa17fa2c90c9

            SHA512

            c0262d659336a31f82e64c249a8a996d06cefef9447993ae3c10c229dfe86b7cd098853610cbe5ef15f3a7b9c7a7efaa1c0547ed1fdb253f08582c2c2f129119

          • memory/1460-41-0x0000000000400000-0x0000000000439000-memory.dmp

            Filesize

            228KB

          • memory/1460-38-0x0000000010000000-0x000000001000D000-memory.dmp

            Filesize

            52KB

          • memory/1460-31-0x0000000000400000-0x0000000000439000-memory.dmp

            Filesize

            228KB

          • memory/1764-29-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/1764-24-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/4056-16-0x0000000010000000-0x000000001000D000-memory.dmp

            Filesize

            52KB

          • memory/4056-23-0x0000000010000000-0x000000001000D000-memory.dmp

            Filesize

            52KB

          • memory/4056-22-0x0000000000400000-0x0000000000439000-memory.dmp

            Filesize

            228KB

          • memory/4056-0-0x0000000000400000-0x0000000000439000-memory.dmp

            Filesize

            228KB