Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-05-2024 05:52

General

  • Target

    f3b3bda415692ecedba050abde6041208ac5f41c42d05b42f4ab3324b5cd737f.exe

  • Size

    118KB

  • MD5

    115baf558234914818cab8251d47f4d2

  • SHA1

    e2fd2398ac908c34020e7cc5f5c35e311045c548

  • SHA256

    f3b3bda415692ecedba050abde6041208ac5f41c42d05b42f4ab3324b5cd737f

  • SHA512

    4f88d7dfef2ca15cdaefebc9e1535e10efc2a516406866db3d0ad02366531b7f82daa5b73e3bc5468d7a97b94be166d7d98adb2f717339d814253f28c3b8ba36

  • SSDEEP

    3072:rOjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPo:rIs9OKofHfHTXQLzgvnzHPowYbvrjD/h

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 12 IoCs
  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f3b3bda415692ecedba050abde6041208ac5f41c42d05b42f4ab3324b5cd737f.exe
    "C:\Users\Admin\AppData\Local\Temp\f3b3bda415692ecedba050abde6041208ac5f41c42d05b42f4ab3324b5cd737f.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4736
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3668
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:1120

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    390ac85acbb0a925aaada252bcc4f8be

    SHA1

    72b0fe397ae81ceb4464c667bb65717df7a92155

    SHA256

    db051141fd37e5f9714d4483839cfdc9bb7d7d90458ca11e0afaffb47dc2e248

    SHA512

    3ae38b446db1352ba482472a14accbdd69a118f27f56c67003223600bc768bff19663694e739263d0e35ce1a021c7a5e4676966f88d4e4409bed080312e07573

  • C:\Windows\SysWOW64\grcopy.dll

    Filesize

    118KB

    MD5

    914b475e8e5f85e4c64d7849350bda7b

    SHA1

    d4be6c6452591a52b53139b42c9e27a74f052bc8

    SHA256

    25194490f39b51cfde0709b3693323105ac8e70338b2491f050cce43df32be08

    SHA512

    6ac3d585f5fe12087ecd2e11c942c67d044c4d9845155c37178c2800fa0811a3f1bb400c8fb9915dd620a961b64c05147ce95da23edea438f1f612d3af270ad1

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    8b83795a836de261f6619f6dadc7570c

    SHA1

    a691ec48c9e418c1789b754115731d1c91fd0085

    SHA256

    e72f3398ffee5e575bcb35d0281f999815a2a0bc1a1ad5effd8909a83bd09975

    SHA512

    7dff153cd02b307318fdda90376a2273d508a900e075b9dbb10330bdd9a6028ef5f6e5d0f274e7f94499dd0c405c996e2e746fb5d16693815b32069ede5eef0a

  • C:\Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    9e4498d7ac2856d8188450db1e4d7249

    SHA1

    a660ec32438fd1ca92a357e8cea94f6923000630

    SHA256

    d27f1f2828dcf15b59bd88c6160e7fd969c6ab8c57cca3c5c3130592690fee92

    SHA512

    25c9c2b4ed5d455c88cf82d983f8bc24df803bf9a48050e7557fcd2ca3655f1f061a6e64fb07d4559be64d8e144eff888aae473c1cb538103f648e90c1468e41

  • memory/1120-41-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/1120-38-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/1120-31-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/3668-29-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/3668-25-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/4736-18-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/4736-22-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/4736-24-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/4736-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB