Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/05/2024, 15:51

General

  • Target

    virussign.com_c6ff1ce00a5e6484de89d9d090ba0da0.exe

  • Size

    75KB

  • MD5

    c6ff1ce00a5e6484de89d9d090ba0da0

  • SHA1

    52a67cb5a09fc9a2fd9116b760c4a1feeb5d48cd

  • SHA256

    b976782c527a56edc4a8aa79c9ec2cdf3159d0336926643e78f6a1c45dbe7040

  • SHA512

    c3daffbc7edd623acf6d8b09c55695d880ed401b23dc263fad2e2cdc6f92593c8d4ae5e30d119a733a64156559bd8e38f0c3f8c4d11ab4070ea6beac282412bf

  • SSDEEP

    1536:1x1Qja7luy6y0s4sqfkbnAKBOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3s:fOjWuyt0ZsqsXOKofHfHTXQLzgvnzHPE

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\virussign.com_c6ff1ce00a5e6484de89d9d090ba0da0.exe
    "C:\Users\Admin\AppData\Local\Temp\virussign.com_c6ff1ce00a5e6484de89d9d090ba0da0.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:656
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3464
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:4896
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4036 --field-trial-handle=2284,i,15722001240173834669,15048020084704567542,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4536

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\ctfmen.exe

      Filesize

      4KB

      MD5

      cf6017a1b714644742555a0d0f3228e0

      SHA1

      05bfd4cb1e97d6e1023bb44566abfcbffe1aa8c4

      SHA256

      1fe5aa546e60f67804cb1013c4a7b50071843a32b2f2e0cf7c44825a41037299

      SHA512

      f09c496f1a1368a2732a57adeac851be17f9c1bd8e6e07b85f3c6ea9164cba73931225b981fdb3335535b44c2352d2956dc29dd264b5a60321285a46f7b72b84

    • C:\Windows\SysWOW64\grcopy.dll

      Filesize

      75KB

      MD5

      0960e4657db436f360a53e03dede8349

      SHA1

      e6fa25991bf83fa564f72d069e80473302126f55

      SHA256

      100ad1e524e9d03bdac5daf8f8b07d92efcc6b1141c0e6390dbbb11af8a65813

      SHA512

      abf3d876f6347012175098005f4b406e81d8aa436f17d6bbd0454272bfb76d124d7a9e2cb9ed4cbb43f2fe864c7604cd60b2dd14beeb790b24766a37cd21974a

    • C:\Windows\SysWOW64\satornas.dll

      Filesize

      183B

      MD5

      0825a58039912c58bd7cba556f76137c

      SHA1

      953d06b0eb3a0d5b4408c1e47724ce2fcdfdc1cf

      SHA256

      536a50568dd7cb0e9c445f1d0aca5510a6a9d9751bb88e087141c2d768ac6012

      SHA512

      da89eb8d873f76c79784116b3eb129d8d4963bebd797e05b1f16f1db5f564d74844c194545d7bf7c0ae8e87601e0fbf6311ff49a3f11a0fa552d4e9b19b4457b

    • C:\Windows\SysWOW64\shervans.dll

      Filesize

      8KB

      MD5

      7ff54c116cbab731b80cb51e721d3a63

      SHA1

      ddb521e8666fb9343512f3699f1f1b4881e4ec1b

      SHA256

      e5feca2aef0a8ac84303be886e0cdb13b82be841efa8fae959ab33dccf94ad26

      SHA512

      565f618f176f99c4c0821f76c9e78af8c2396c9c19afd37f238b4bb7cfa602949bea2aca7cd07f3d5a9354248e6cf7a4bdf7924c9ab0c6b9ae03462d6058ce4a

    • memory/656-11-0x0000000010000000-0x000000001000D000-memory.dmp

      Filesize

      52KB

    • memory/656-23-0x0000000010000000-0x000000001000D000-memory.dmp

      Filesize

      52KB

    • memory/656-20-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/3464-24-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/3464-28-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/4896-41-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4896-49-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4896-39-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4896-36-0x0000000010000000-0x000000001000D000-memory.dmp

      Filesize

      52KB

    • memory/4896-43-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4896-45-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4896-47-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4896-37-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4896-51-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4896-53-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4896-55-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4896-57-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4896-59-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4896-61-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4896-63-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB