Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240708-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240708-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/07/2024, 21:50

General

  • Target

    42084f0e085e7caf07b3a37d3b3ccbab307f6682af92eb27b3d72fd25363ddbf.exe

  • Size

    2.3MB

  • MD5

    d2197f4cf49c91b31df0447d6fa7def0

  • SHA1

    71019c0314df5f18b244b5f2894d3ea5ccf82209

  • SHA256

    42084f0e085e7caf07b3a37d3b3ccbab307f6682af92eb27b3d72fd25363ddbf

  • SHA512

    a13d812eb57741bfc33f2ecab399bd8bc479168f7309c795444845a0a1acc7655c639aa64f14659c2254dceb9a34927508f78eef847b686635dc3c7c7afa07da

  • SSDEEP

    49152:ajvk2d9rJpNJ6jUFdXaDoIHmXMupzh72lxakn2YpHdy4ZBgIoooNe:arkI9rSjA5aDo73pzF2bz3p9y4HgIoov

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 18 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\42084f0e085e7caf07b3a37d3b3ccbab307f6682af92eb27b3d72fd25363ddbf.exe
    "C:\Users\Admin\AppData\Local\Temp\42084f0e085e7caf07b3a37d3b3ccbab307f6682af92eb27b3d72fd25363ddbf.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:436
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:5052
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:3952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    0b76d7756ec3fbdea4caf92ecd0a859c

    SHA1

    3e1980e2e9a8afcf5da3bbe97c15eff751c92f0d

    SHA256

    17a30c576cacc63a518f2bfe972b538b3a13c5898d0cc7948d67709719cda155

    SHA512

    bd463c1d77385aa7705c995e62ec542d409ca60ab8585ebabc86eb94df475d90ae1caae85dc19e8dd0abe602dd64f02a5e0898c0560b6fefe5ce551ab5a1f0b3

  • C:\Windows\SysWOW64\grcopy.dll

    Filesize

    2.3MB

    MD5

    7a9e0be1e398835becfbe11cc522ed14

    SHA1

    625320ff5f22f39f1dc5d9f64c95bd57f1382a90

    SHA256

    4300bda3c22423d6af09645611bbd58b2eab9e85e298bd535a42868860bf3991

    SHA512

    d1f7e16443709497f9cf2f5c7a31508eeabb9e29005ef1713161e739834a90aa7c9101b11d23f69537dc63fd1e6eaacf6c2083559a73610ad88794f7c36f5e97

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    7a0377d28c56675570d10e8ba3a8c8d0

    SHA1

    ee46bd7b1f7b79519ae26c5b494b2105cd3cc3d8

    SHA256

    f474b2e360e092fc124d7260a13d73acbce14191f2c6d9aff4db16de9cc44011

    SHA512

    7150c8b32812340389ba4981f9d25dc334746a7c124454e570aaa28c7388867db61e5c4c14f42fe7677f2e136d526e85d0cb8d0b8ce551cf73ea85e3877aff28

  • C:\Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    d5f56315532cc3fe3c323d4974ee65df

    SHA1

    aee75b5f9d6953957f082730463e0b075fe179f8

    SHA256

    835f4461e738dc2ac8e28af12730bcccf3d9a8e70d49655fd3521089e0766065

    SHA512

    48fcdb968796600f3734c112d5eb7951a1069affb2d2e11dc5f63b0f1276dd1877be26e1af25e4a2c564ff77833f0279b5e0bfcfc8a0eac4e37248556a124fa8

  • memory/436-1-0x000000007FA70000-0x000000007FE41000-memory.dmp

    Filesize

    3.8MB

  • memory/436-19-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/436-0-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/436-26-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/436-23-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/436-30-0x000000007FA70000-0x000000007FE41000-memory.dmp

    Filesize

    3.8MB

  • memory/3952-40-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3952-48-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3952-31-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3952-39-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/3952-68-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3952-42-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3952-43-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3952-45-0x000000007FA70000-0x000000007FE41000-memory.dmp

    Filesize

    3.8MB

  • memory/3952-46-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3952-33-0x000000007FA70000-0x000000007FE41000-memory.dmp

    Filesize

    3.8MB

  • memory/3952-50-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3952-52-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3952-54-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3952-56-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3952-58-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3952-60-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3952-62-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3952-64-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3952-66-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/5052-24-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB