Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-06-2024 04:28

General

  • Target

    f6cc397f971791cb7b5f08bf3c9fe5ad641894bb30572df41788d70d402f9d44.exe

  • Size

    75KB

  • MD5

    6e1031c4e619b42008942d2777845af2

  • SHA1

    3df54441152bfe6d0cf222eb1f2484b70e5b468a

  • SHA256

    f6cc397f971791cb7b5f08bf3c9fe5ad641894bb30572df41788d70d402f9d44

  • SHA512

    5cb70fdc8bdab3e1e3e2b51a2de4f48e2a2ada9485143bd54bb1f38a1d4d9f8f9f3aa563b4fe12c8009e5d624474735bc1b99fe1224555326cb584ef0a8d2f15

  • SSDEEP

    1536:wx1Qja7luy6y0s4sqfkbnAKBOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3s:4OjWuyt0ZsqsXOKofHfHTXQLzgvnzHPE

Malware Config

Signatures

  • UPX dump on OEP (original entry point) 7 IoCs
  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6cc397f971791cb7b5f08bf3c9fe5ad641894bb30572df41788d70d402f9d44.exe
    "C:\Users\Admin\AppData\Local\Temp\f6cc397f971791cb7b5f08bf3c9fe5ad641894bb30572df41788d70d402f9d44.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4400
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4560
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:4408
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4440 --field-trial-handle=2256,i,6670388345726423024,18382795228658886258,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:4700

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\ctfmen.exe

      Filesize

      4KB

      MD5

      84b479cfb6e123a3904109d55ef48141

      SHA1

      f4abcb09443bf2d1d45d34d1fe6c4bfa7119dc15

      SHA256

      68fc3e0cc3ab0763bd3edc0f2dd68be55c21a98228ba6eef61bf7222cc5a6a4a

      SHA512

      1c15cd7a0e6cbcb4aabe8073263104e6fd5197d7b0afb5ae0d9c4121edfcce62dac3cdd4e6eaf388670e29b888058438c289b48639a5146ecf31cb2733550ead

    • C:\Windows\SysWOW64\grcopy.dll

      Filesize

      75KB

      MD5

      2bb70c07eb02c6874a8325ab095fb35b

      SHA1

      ef385004a31809357e03702f4f82a388a8df477c

      SHA256

      1f1de4cb2cef894b407f0e03b45868bf3d71f58a5cff0bb4f892e08fd500fc53

      SHA512

      878681a8ebe650b9fcd77675e09733903aa3a6107f26213f846e6540c77e6d3039dcfb3532094dc6a10ff1fef6f4f5e3587fb9fbcb0c004f34f0f9b5103f65c5

    • C:\Windows\SysWOW64\satornas.dll

      Filesize

      183B

      MD5

      0b9a6b6f90a205f2a8aae5c5b4c6ed06

      SHA1

      58a9c9004290df94c6577731c8d0a25b4740d4af

      SHA256

      f12e187e722b1d29aab11cea54f91789e6fd884b333cff072316a5c0a05ac583

      SHA512

      e9ccf82120db0395480308f9883e6557aee57d2e922c2e459179215944433886ce95242255dfe66ad30493d3e38d5e220a0894ffa930c98cb5ff2934b61ae081

    • C:\Windows\SysWOW64\shervans.dll

      Filesize

      8KB

      MD5

      c84be07278e5772b3fbe5bd4347c2582

      SHA1

      d53467acee8daa06ea28bf9627868d056e479995

      SHA256

      48625c7c7984bc336bd35a1b717e5c6069dba5b63a5807db1929c9985dfe2ea9

      SHA512

      01911a718d810c4b8fbfc71b7a7f2f2abf35a9506f5a136bfdc7f059a1066f3ae2c8669cb54ef57ee260b98d7388cfa2bf9732c6a584b803951bf438a8b0f5ab

    • memory/4400-11-0x0000000010000000-0x000000001000D000-memory.dmp

      Filesize

      52KB

    • memory/4400-24-0x0000000010000000-0x000000001000D000-memory.dmp

      Filesize

      52KB

    • memory/4400-21-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4408-41-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4408-57-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4408-36-0x0000000010000000-0x000000001000D000-memory.dmp

      Filesize

      52KB

    • memory/4408-37-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4408-39-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4408-63-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4408-43-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4408-45-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4408-47-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4408-49-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4408-51-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4408-53-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4408-55-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4408-61-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4408-59-0x0000000000400000-0x000000000041C000-memory.dmp

      Filesize

      112KB

    • memory/4560-28-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB

    • memory/4560-20-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB