Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    19/07/2024, 23:07

General

  • Target

    1cfc37e353885058e7cda7dc5e5b4440N.exe

  • Size

    119KB

  • MD5

    1cfc37e353885058e7cda7dc5e5b4440

  • SHA1

    04038f7f71832a754bd0db1c4970b2be4ed1514e

  • SHA256

    4d0f33c162dc072e08c2f9d90952364d4e6fb52be832059973d4f933ad6a2635

  • SHA512

    327d7958458b70de733aa11d8327c4eefec4ef548568b350f0635b92f1ae209902fe176301da769a359df67b7c5c639a859b345c10df89682c0b190d837b6af7

  • SSDEEP

    3072:bOjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPh:bIs9OKofHfHTXQLzgvnzHPowYbvrjD/E

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1cfc37e353885058e7cda7dc5e5b4440N.exe
    "C:\Users\Admin\AppData\Local\Temp\1cfc37e353885058e7cda7dc5e5b4440N.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2988
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2868
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:2820

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\satornas.dll

          Filesize

          183B

          MD5

          b46009b8ad05eb8bb4468e91cea7d8cd

          SHA1

          470620a5cdb694bae03014d55e89c2a68df46077

          SHA256

          c7d2b9db6dc4d90775ae289e62e167255e80fde9a12b3cd6d9e82af74b50160a

          SHA512

          870c18edc10e7c9008b49587dd25a999495a312a6b764c8ff9029c6f0339276e16ac8375b4ea7838c37237928f6a2a8d30afa67246bfcd0252a099da3fac7b99

        • C:\Windows\SysWOW64\smnss.exe

          Filesize

          119KB

          MD5

          d92b6dc985c58d3b5c9206640c1b777b

          SHA1

          d9f751b4095fb0b06a2b3e116eb3e5622989a4c1

          SHA256

          0728127ce1080cfc9b58cce94c7cd1cbd1700871f21cd43cc8520412424d7dce

          SHA512

          db9f05686a7b1ec1cafd28e35784b79a466fe58f0525dcd1a93009fc8f9426dc563039680ac58e08cdaf67e03959d433508ebe8ab400267f18a7945b8faf1963

        • \Windows\SysWOW64\ctfmen.exe

          Filesize

          4KB

          MD5

          461bedd17189c57e06f7dc53e3dd95df

          SHA1

          eb08462d566cfddf8614da09e5b6248cd70547f5

          SHA256

          ddccc3b9635e4b366b44e02a61ed2bf37de68f2c6a06470fdb7561996d889deb

          SHA512

          fd389d0507960c301c9db8b9bb76ec22e910d42a4796227f616fbcf106765f57b309b57e114e4954ae0c785897f06dc5e53cb99bc629f40d50b755b73b1fefe1

        • \Windows\SysWOW64\shervans.dll

          Filesize

          8KB

          MD5

          b3a445bca13c904ac6b892b8a8612fa9

          SHA1

          b3c55c15ec8fa7c5ebbc0ee7ec1ba89c7374419c

          SHA256

          2424582dac8620f0bc584a58fff2c2290b7d3c454bcc47515593f4c3bec5ab3a

          SHA512

          717a44e06c17c74c81b841f4ba550c2ba64e0c62319e42c40dd9f6d2d2aef67a63feeb9b595864bde1491cb3046dd697d02bcced5ee5e8cb2854197ec66cef3c

        • memory/2820-38-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2820-41-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB

        • memory/2820-44-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2868-27-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/2868-30-0x0000000000320000-0x0000000000340000-memory.dmp

          Filesize

          128KB

        • memory/2988-26-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB

        • memory/2988-25-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2988-0-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2988-16-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB