Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240730-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-08-2024 21:21

General

  • Target

    043f5e81bfdadd137e8ed9d7af9071b0N.exe

  • Size

    2.3MB

  • MD5

    043f5e81bfdadd137e8ed9d7af9071b0

  • SHA1

    11d3544ced96e144d634850c5ffaae78cacb395a

  • SHA256

    ad227a9586e5a3f7a685e5a68fdd2f956afd8b44de3c0986ba25e00f68b443ef

  • SHA512

    2bdefad1d698b6e0fdd63035f97e58b162ac22db7d7af47ceb3a887d0d5f60b04b0200d91cbd2291bd16825a221e112fd2506e6dae5f90a5d0d38c86c9b8b9ec

  • SSDEEP

    49152:yjvk2d9rJpNJ6jUFdXaDoIHmXMupzh72lxakn2YpHdy4ZBgIoooNe:yrkI9rSjA5aDo73pzF2bz3p9y4HgIoov

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\043f5e81bfdadd137e8ed9d7af9071b0N.exe
    "C:\Users\Admin\AppData\Local\Temp\043f5e81bfdadd137e8ed9d7af9071b0N.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4444
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3612
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:3252

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    5a01f31744970b48c4b133d34bcf1eba

    SHA1

    1f8d9c118918b191215341924b9531ca275c56eb

    SHA256

    f769a502df3a059917b79cc1f06ec36802857eb538ef791ea43ec8a0d1597fed

    SHA512

    6e0ab460f117017cfa09391e77868b3e968a32ac12bb8e09fad650613aeef6d2c8f9984713a4f2645ce88dea8c15543e850980dcd7607896018ad3cfb26c674c

  • C:\Windows\SysWOW64\grcopy.dll

    Filesize

    2.3MB

    MD5

    4655681dcfd03b65cd6fc8b4d9cd6e60

    SHA1

    7f438e6af6cc667059dee8225217d4133d8944d7

    SHA256

    106d51d3b6a97dff12bb4aab581d7774b09caae61f3df27f7f1253182abf4a76

    SHA512

    759898cb181814bcbbb036c1c00b4fe3a8d4f42577088a2ccec07c1ae77e63b0d674972724386e050fba044d8ec6b3c5241395039182a4d36d31742197d2dac0

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    f23a270417a6936ca2a71a5f9cf765a8

    SHA1

    26ae651699c821ffb2dd0c380c202e11b1a8063b

    SHA256

    23cefc4f6dd08ec894afdce5f69ce1a4fdc2edfaf5e37ac6aa9a5a7a4953ccf7

    SHA512

    ba2c80eec6efc83d8c3264966dda6319a0ce1e4134c9c019777bb316260bb1984225ac118c1f47ea296169b634fb653369f7f8f2c54a3520dd5a890362d4d2bf

  • C:\Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    9b9427df1401bdd83ddbf144a33fb81d

    SHA1

    a34178b97514cb889b6ea131b7af8a970622d1d5

    SHA256

    cb2dbdbf8357527f225be5e63ff3dc08d60a32443a6cc018d12f4e0f90e1ad0d

    SHA512

    2cc2529cf4c85a456b192dbd49220c74dd7de141fe14ee85c9bbbe60f89e4b9cbe17fa85a3d22ca61b3aa36f932af734cf2065a260c5d847e4904373d1b93331

  • memory/3252-48-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3252-43-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3252-62-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3252-60-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3252-58-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3252-56-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3252-32-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3252-34-0x000000007FA70000-0x000000007FE41000-memory.dmp

    Filesize

    3.8MB

  • memory/3252-54-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3252-40-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/3252-41-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3252-52-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3252-45-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3252-46-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3252-50-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3612-23-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/4444-0-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/4444-14-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/4444-1-0x000000007FA70000-0x000000007FE41000-memory.dmp

    Filesize

    3.8MB

  • memory/4444-31-0x000000007FA70000-0x000000007FE41000-memory.dmp

    Filesize

    3.8MB

  • memory/4444-27-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/4444-25-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB