Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    16-06-2024 04:28

General

  • Target

    f6cc397f971791cb7b5f08bf3c9fe5ad641894bb30572df41788d70d402f9d44.exe

  • Size

    75KB

  • MD5

    6e1031c4e619b42008942d2777845af2

  • SHA1

    3df54441152bfe6d0cf222eb1f2484b70e5b468a

  • SHA256

    f6cc397f971791cb7b5f08bf3c9fe5ad641894bb30572df41788d70d402f9d44

  • SHA512

    5cb70fdc8bdab3e1e3e2b51a2de4f48e2a2ada9485143bd54bb1f38a1d4d9f8f9f3aa563b4fe12c8009e5d624474735bc1b99fe1224555326cb584ef0a8d2f15

  • SSDEEP

    1536:wx1Qja7luy6y0s4sqfkbnAKBOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3s:4OjWuyt0ZsqsXOKofHfHTXQLzgvnzHPE

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 7 IoCs
  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6cc397f971791cb7b5f08bf3c9fe5ad641894bb30572df41788d70d402f9d44.exe
    "C:\Users\Admin\AppData\Local\Temp\f6cc397f971791cb7b5f08bf3c9fe5ad641894bb30572df41788d70d402f9d44.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1092
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:2712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    1c35a751c734e35be0712dbddf536660

    SHA1

    aff46f5139e1a3faf4856408bf26a695c7293e74

    SHA256

    8dd74c812fc969b172b800de8688938572701e9191ca479cf8150fd29368fcd1

    SHA512

    97df19862c1e0fcc7968667fe13040c35d7dc4e37ec8e0d45546b98a79274a1b52466c834d96aca47b9a3bddea8c05a27fa8ba98b0d15574ac28fb11247e7470

  • C:\Windows\SysWOW64\smnss.exe

    Filesize

    75KB

    MD5

    b7a3ec0c713f838bb12ed8ad61e39477

    SHA1

    ba4e23a6a59d6d821bdc9302d9a733aa9b55aebe

    SHA256

    1a6c9ba41e35158bccb89c1741e01dea3db3e17df2ecbd34acf6c6e3583acd65

    SHA512

    92e6dfff7887f6079fb5c08ba2f64c4f16a417857e936c458b1c77fb2715de6e091a89aee5ffcf773805d397ec173d96a85249bf231c9117b1c4b403250c11b8

  • \Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    762816bff7f3d96d297a6faa3e43c2ed

    SHA1

    fddb791530e9332b46032aeb580f6bb38183eae4

    SHA256

    3c008ceebc8023dea94fadad7e6a759cb87e09e32ce8218c75823442c3a52110

    SHA512

    b241d4bb9a11c7c84aebd8f57cac1d63adeb50c7ddfd3b140da9cc2f96c4f75b05fe8347a2b88eecdfe94d868a97539768f4a7c994802b4fbd4cf47d4eae57da

  • \Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    dfb0de020a65735dce2cd25c8a331069

    SHA1

    beee4c9b4b9a3761360bd3deb1809f6473ce6d20

    SHA256

    c3351f5460b5b12bb52563035d95ebc8931b57f1b2c000769eabc75e9a1df9f6

    SHA512

    74bb7f91e45bb0cd459978f8bd3fb70fb4c389bbf89075a9d9b9003df3e1800e95ecd99b4d09b8665d7f7832ca466919de17c86bf34a8a2f2047edcf9188441c

  • memory/1092-27-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2220-11-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2220-17-0x0000000000340000-0x0000000000349000-memory.dmp

    Filesize

    36KB

  • memory/2220-24-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2220-26-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2712-44-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2712-52-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2712-42-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2712-39-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2712-46-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2712-48-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2712-50-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2712-40-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2712-54-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2712-56-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2712-58-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2712-60-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2712-62-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2712-64-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2712-66-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB