Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20-07-2024 04:16
Static task
static1
2 signatures
Behavioral task
behavioral1
Sample
4a4ed9de88f5d464a198fec520c550c0N.dll
Resource
win7-20240704-en
windows7-x64
3 signatures
120 seconds
Behavioral task
behavioral2
Sample
4a4ed9de88f5d464a198fec520c550c0N.dll
Resource
win10v2004-20240709-en
windows10-2004-x64
3 signatures
120 seconds
General
-
Target
4a4ed9de88f5d464a198fec520c550c0N.dll
-
Size
8KB
-
MD5
4a4ed9de88f5d464a198fec520c550c0
-
SHA1
7c3563dec0e57afbce00fd55ca7319dffa6fb60d
-
SHA256
2fca5698bfbdd7c1754533b88f3e4f0aece0b1740dbb4f066db5df32cbbdb442
-
SHA512
f4c78e16cf38c4b413ab177a3ac71de6e544c91f4ab48c342dde1b1284f4a49532ce93d5440b0d16eae845e148ee658ac1030eb01e2ece3649a2a405a019304c
-
SSDEEP
192:rh4SFyvWohE5xf6YUBSL63SUJqtMblWN:rO+ohE2B13NJqtM
Score
6/10
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ctfmen = "C:\\Windows\\system32\\ctfmen.exe" rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\satornas.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\satornas.dll rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2708 wrote to memory of 2852 2708 rundll32.exe 30 PID 2708 wrote to memory of 2852 2708 rundll32.exe 30 PID 2708 wrote to memory of 2852 2708 rundll32.exe 30 PID 2708 wrote to memory of 2852 2708 rundll32.exe 30 PID 2708 wrote to memory of 2852 2708 rundll32.exe 30 PID 2708 wrote to memory of 2852 2708 rundll32.exe 30 PID 2708 wrote to memory of 2852 2708 rundll32.exe 30
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a4ed9de88f5d464a198fec520c550c0N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a4ed9de88f5d464a198fec520c550c0N.dll,#12⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2852
-