Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-08-2024 02:49

General

  • Target

    c599e2b50df2ec204ca0ee1d5586ed5d0acf85c3e0bcbcade89b74b1ff7fdfe2.exe

  • Size

    75KB

  • MD5

    d45b15ca1abe56158120e0fcff16e68c

  • SHA1

    e4fcd22a3632669b7f0b8ac44c6d27aa1a551bca

  • SHA256

    c599e2b50df2ec204ca0ee1d5586ed5d0acf85c3e0bcbcade89b74b1ff7fdfe2

  • SHA512

    ab877a50323f9756278f43547dc7447a8f1a63369fb3eeb3f64fedf15815526d9f74cdb5162f40875b1860fc60855c99a47dc95a80ae0b5f2afca4119df80a12

  • SSDEEP

    1536:hx1Qja7luy6y0s4sqfkbnAKBOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3s:bOjWuyt0ZsqsXOKofHfHTXQLzgvnzHPE

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c599e2b50df2ec204ca0ee1d5586ed5d0acf85c3e0bcbcade89b74b1ff7fdfe2.exe
    "C:\Users\Admin\AppData\Local\Temp\c599e2b50df2ec204ca0ee1d5586ed5d0acf85c3e0bcbcade89b74b1ff7fdfe2.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4992
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4508
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:2268

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    2d8ef7aee711d999c71fa09e96580313

    SHA1

    4a075e6577786d3ad79360ab5c1a8781e8189a1b

    SHA256

    9351d26cc022ae33bedffc0430fa0a890c88a901cb8a4305e92988d69da26340

    SHA512

    6d136362bc7b032e3381ccf94656473e6b65ce976170cdc1dda8780371fc65c3c148872216ca9b2430d09d41b3e22207eb70b7ac62b32667c34b91c28fc75467

  • C:\Windows\SysWOW64\grcopy.dll

    Filesize

    75KB

    MD5

    998131df224ae219ff9266ca416547c3

    SHA1

    9fc6f47ab3e47ed06f235332f7b1639c149e251f

    SHA256

    b15dfcb83570e2e30681dca7ef98a44cc325fe06ee4d9e51762c6c2e283c0b01

    SHA512

    55b2c995e5a208ecc1ddb3eb340e5f3e310774ad948cdcd2ff45dce252413cc228e8f0000d8c3cd63b771c3e84d78a40257be68467bb85ce1c9d6d0c1c594860

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    77c6078a55c5f5526a689642bf4a59b9

    SHA1

    967de213610490cd0435547b078579aec79382e4

    SHA256

    ac8354a54a147c578a5899a2c0e244fdfee1d69eecbad428b87f39443690cee8

    SHA512

    7696e438bd345cb4c30a4262b724f4e8359789d7253d73eff85d42eb7570640cc1c85b235aa027f9e432e02d8f13d1075d5c9597ace8da23273aa469de3571f1

  • C:\Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    1789157bd6557105959051ad9651682a

    SHA1

    9427b61da10def8ba79b09a27db0bc8bfe9d4410

    SHA256

    bfdf8e864e80a9c57d7539a45cc58731c65b1f8e6a93f4c945db79eec43f2f2b

    SHA512

    cbffba6281cc52fd6e50747f9696a7054e2cbf6a6d097ff82f7e2ab75403e94978a09e723f8e186f6e4e2028df37f94e357c3f1dccc4a09a00356274477470af

  • memory/2268-38-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2268-44-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2268-62-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2268-60-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2268-35-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2268-36-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2268-58-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2268-40-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2268-42-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2268-56-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2268-46-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2268-48-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2268-50-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2268-52-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/2268-54-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/4508-24-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/4992-23-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/4992-17-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/4992-20-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB