Analysis

  • max time kernel
    117s
  • max time network
    25s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    27-07-2024 21:32

General

  • Target

    03c0395eb89532cbf5bdc125875e22d0N.exe

  • Size

    352KB

  • MD5

    03c0395eb89532cbf5bdc125875e22d0

  • SHA1

    f9201487605aa74a388ead9ca77ef81b8d2d6562

  • SHA256

    5706b1ee8808f71f8b11878c5c29670ae179c242c675725abc933b5463acb62d

  • SHA512

    15ca4519f663311fa33ccac5ae7d0404769022ab7a691c2ef17af7312575343392b5659579dc992cbc39d119f3d4e48734c227c79e97635db78d488d552eac91

  • SSDEEP

    6144:SIs9OKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPFsEPAsKCe8i:/KofHfHTXQLzgvnzHPowYbvrjD/L7QPs

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03c0395eb89532cbf5bdc125875e22d0N.exe
    "C:\Users\Admin\AppData\Local\Temp\03c0395eb89532cbf5bdc125875e22d0N.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2452
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2836
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2760
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2760 -s 828
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2340

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    815a3a261451f7b5c13ec8825eb7c05e

    SHA1

    214f043b5c5b7395c38ff98e19255ba757864037

    SHA256

    2422e287c502a8df3df96d5424d3f0b0c476c6d8a0f1268d32a10e85a9b7968c

    SHA512

    e530805aa1fc505c5f154a0ea2095e8bc354a7e6a752af0243ca54a4636f051275ccf407baa4700135836a03f3e52e4e4eacf875eceec7cfcc6f7332667e9127

  • C:\Windows\SysWOW64\smnss.exe

    Filesize

    352KB

    MD5

    8ef0925d013a435ce2c9ca7b6eb3dee3

    SHA1

    d6431d643b4281ff512b9af7bb1ee0496218e663

    SHA256

    46f8c77ed821dccf5a29152dbb838f9c4772b80666ad6d603ac8d8e965d82087

    SHA512

    3aeebba7666c5333429dff0d41513870f683e89be10033bbec14603707ce7d044df0e41f5a611426dbd01048f2badbf1064e170bc94f44cbcf90c78decce680a

  • \Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    51314c154c02df74c403c2e3faadef2e

    SHA1

    6d1bc039c49a08606a854d0ecce04a1cd7c43e5c

    SHA256

    d0ac124a28bd136650fe33410333702ea4353cc318b41429850ed7a9c00bc73b

    SHA512

    216d6d09f0780026de98c667bafe6971cadaa2c111d910950940c90b7d5b2b0948cfb57a91de4ba40cb9912fc39d873ce6ff0b71146fda37ee4f7f8d7f5e5a63

  • \Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    8bba6a61c62ec5a3992035400ff1e5bb

    SHA1

    d11fef5f08fb6bffb44c26b11278571192c98672

    SHA256

    c626f162a1eb9a023bc2be0ec3742a9cf501120909e4cf529d904d5a41e979e4

    SHA512

    5262448722502b43748d8ca200dcd18db12db826f0fd88413897e74707744207596b02d71845fecdd5461c12437036a7b9c57cf32a23cd8c93f91f3597ea836b

  • memory/2452-27-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/2452-25-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2452-0-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/2452-19-0x0000000000330000-0x0000000000339000-memory.dmp

    Filesize

    36KB

  • memory/2452-12-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2760-35-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/2760-42-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2760-46-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2760-49-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/2836-26-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2836-34-0x0000000000320000-0x0000000000380000-memory.dmp

    Filesize

    384KB

  • memory/2836-30-0x0000000000320000-0x0000000000380000-memory.dmp

    Filesize

    384KB

  • memory/2836-48-0x0000000000320000-0x0000000000380000-memory.dmp

    Filesize

    384KB