Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    10/08/2024, 20:38

General

  • Target

    3aff63669473d35daee11521ece2cd6f7d0bbc61b580b8f0d302cdfe2f162d46.exe

  • Size

    120KB

  • MD5

    d3d850adefd3eabe87262ac075de21bc

  • SHA1

    0ebd169e0f476b28c03d6d58534c894de159733e

  • SHA256

    3aff63669473d35daee11521ece2cd6f7d0bbc61b580b8f0d302cdfe2f162d46

  • SHA512

    52a26fc785dcc68ee6b2380b9ce0459e6543cd38d6b0f819d3ed4f0b9308b93d7d2fd99446a1019eda5345329b506154f7a6acff3da4927086175a4c82386373

  • SSDEEP

    3072:hOjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPh:hIs9OKofHfHTXQLzgvnzHPowYbvrjD/E

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3aff63669473d35daee11521ece2cd6f7d0bbc61b580b8f0d302cdfe2f162d46.exe
    "C:\Users\Admin\AppData\Local\Temp\3aff63669473d35daee11521ece2cd6f7d0bbc61b580b8f0d302cdfe2f162d46.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2820
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2840
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:2004

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    46b7f5982a8728ecd1f39841ec6d66ae

    SHA1

    dec064eeb9817967ede603b1ff43201007d63447

    SHA256

    85683667ff234b10adb9970ff9a7ee8e1183042b9ac6e500bfc6044c679f57cf

    SHA512

    eb18b6f1c9d5622b6ee506e57268f6b168a61022f3cf08d5dad4a74cd0df3f017ecd5d4d16736ab7c5c49d48c7b2dc8ca3f3aa8acb9710201b9a79d7b2e6038a

  • \Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    507e68eac490ce7bea66b1817c0a3612

    SHA1

    07979a09a47a35fc4f25bb615f3af042bbba43e9

    SHA256

    76df04a8e5458a3b551eee816924715d39f77b6619f9b671ef4b3d29156fea23

    SHA512

    7c836a8f14c7543361667ca877b41af134080efb339c6f7e09c12491928733b6f3ad8f86f90f296e3601cf62f349d223b02fb7b6a25f80f3f304d4cc6a1a42bc

  • \Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    97078797cefe739d66b1dd763fb4e3ed

    SHA1

    37f201141ab40e6f9a993a7b689e01489ac2f474

    SHA256

    7a0c49d8415a184823fadd3093d9e646810f851317ed9924598bf07066e35a36

    SHA512

    15401feb32637ac87644a9647582afa13a5371d2c7d83520f75f26f8e75d4708999d5eb66eab2c43c2ff22f8b8250db3e90315b16833eddb7ac68ccfdbb66f98

  • \Windows\SysWOW64\smnss.exe

    Filesize

    120KB

    MD5

    4ce3a8fd1f1f392464dd6b4dcd59566a

    SHA1

    c6009c71380d367d9209edd177aed078fb8e2017

    SHA256

    33b829a8f8ba13b6f8753ea9ff586b974e9841b6b4d969f79e887c76d6c6b4de

    SHA512

    2efacc523077ffbb735dde26ef3eee713dc07024aa6aef517abe27065e94bfababa9ab2688c7b2381305d0f04d9bacd9c8c639765bd6e786312678055f38fda3

  • memory/2004-44-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2004-41-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2820-24-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2820-0-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2820-25-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2820-16-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2840-30-0x0000000000320000-0x0000000000340000-memory.dmp

    Filesize

    128KB

  • memory/2840-34-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2840-27-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB