Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    14-08-2024 00:10

General

  • Target

    4b162d69d170bfb0015c1ff5785b3f10N.exe

  • Size

    2.3MB

  • MD5

    4b162d69d170bfb0015c1ff5785b3f10

  • SHA1

    86c0c347123e854b895c8d87faf6e94c256c6262

  • SHA256

    2ec5fb9a640626c0f8dc5f20c8e6923e3fa971ae1af79cb8344ad55e8664da64

  • SHA512

    abe7e4152d42ac6ded6b226df702138e111e73d45ea2f7b309c643df05bd24cd54e19bb7edc4de579c5a0ede3a41e1c629013c7623ef1a99de46e67867f901e2

  • SSDEEP

    49152:ujvk2d9rJpNJ6jUFdXaDoIHmXMupzh72lxakn2YpHdy4ZBgIoooNe:urkI9rSjA5aDo73pzF2bz3p9y4HgIoov

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b162d69d170bfb0015c1ff5785b3f10N.exe
    "C:\Users\Admin\AppData\Local\Temp\4b162d69d170bfb0015c1ff5785b3f10N.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1940
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2076
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    9c635734faa57b95c87fd8254c9c6851

    SHA1

    b5335f4b3fe88de6fe2a02e16c67f508ebd4fac1

    SHA256

    176170db0e37817a7745ab4aed808300042d4915337f1e61d4aa80115801cc6a

    SHA512

    d467d54df6277cae5eda6bc9f020fe43851a15ed2e3210cad511fa99e2d7089c90bbb07e25cb92cd9aacf750f6296f05b72edb943f5f30752a5fa4b3f9972d28

  • \Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    3793de0788a21c3d5872f4a37e321098

    SHA1

    537d2dc90d74d9cdfe40b0983dcfe5f8e9a6c6f7

    SHA256

    ea7c0c8fd2d3a1bf6bd38b640e111b441ab7ce2dc7a954f093d47aef63c70c84

    SHA512

    723105ba0fb97a08817b5f635767ab10f8ab231797c608d81fdd0129d1a971367a30a937a6dad0fe0a2693cd941b2818a43d93c948b62417f481775418446bfd

  • \Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    1c7c62c4696b89b7af76e8ea2e665b84

    SHA1

    341ab7d6f44e159663a6cb0d0418e1df41d5289d

    SHA256

    0bdfbe41b4485c6c4807ba187682c047892d8115d562b6cee7fecebc82c73cce

    SHA512

    40755da911b1681e55eb9944a1af34e721630283881081708b9ef201b4d36fbbdc5074503c1a40fab32e3a33e40b8468513d09c043331fc1a29605571dc2546a

  • \Windows\SysWOW64\smnss.exe

    Filesize

    2.3MB

    MD5

    693cb6f5d5942f30335a17070ed775c3

    SHA1

    c328da35716f3e53fc16012aa7a2ed82096ec97d

    SHA256

    09d367cef09f945c04fe150f54287d17c31605d2a20c09706e1cca9adb33497e

    SHA512

    725f97fd8bd2a80b28f8523c60cf2669636feb8300dd5ff92f51f2dedc1f4baf531107f59f55e8c889e2debba31a2c50eb7bdae27559c8c444d7212f45f1fa3d

  • memory/1940-0-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/1940-1-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/1940-17-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/1940-26-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/1940-33-0x0000000000170000-0x0000000000179000-memory.dmp

    Filesize

    36KB

  • memory/1940-29-0x0000000000170000-0x0000000000179000-memory.dmp

    Filesize

    36KB

  • memory/1940-36-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2076-32-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2312-37-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2312-52-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2312-44-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2312-45-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2312-47-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2312-49-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2312-50-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2312-35-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2312-54-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2312-56-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2312-58-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2312-60-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2312-62-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2312-64-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2312-66-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB