Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18-08-2024 21:49

General

  • Target

    641ccb91858a503af1bcefcb048de6eaa5d351e20e7fea098edf8b0985d2c896.exe

  • Size

    2.3MB

  • MD5

    870bc17643a8e6620ab5add7f744b766

  • SHA1

    f32a30d3059d87c1e6244e8a120f090b70f24be5

  • SHA256

    641ccb91858a503af1bcefcb048de6eaa5d351e20e7fea098edf8b0985d2c896

  • SHA512

    d87ed8f6e3ba362011653f865d702a601a9bd6c398751104fd4941cb1f9bf0509b1ff725561b1d0e1081d882f4ec390a2257da194d0fa69d654677d61ae9f4f2

  • SSDEEP

    49152:Qjvk2d9rJpNJ6jUFdXaDoIHmXMupzh72lxakn2YpHdy4ZBgIoooNe:QrkI9rSjA5aDo73pzF2bz3p9y4HgIoov

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 17 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\641ccb91858a503af1bcefcb048de6eaa5d351e20e7fea098edf8b0985d2c896.exe
    "C:\Users\Admin\AppData\Local\Temp\641ccb91858a503af1bcefcb048de6eaa5d351e20e7fea098edf8b0985d2c896.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3004
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2880
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    ff55de47dde223583b1c4df21d750e50

    SHA1

    5e6370756ec9bb0b5ee096e35788710bbf1c6a7f

    SHA256

    7a40b83623b3abedeae2a7673bc59b89654e809422bb510abb6f107aee766984

    SHA512

    46748e3819fdd39f831d5aa0956843c242724ea318a951f9fc0424fea73c0c3a7731aa464c889a89efff0697b67ab3bb96d46d52f8973ade4a9e94ecb3cf9fad

  • \Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    41fda6ac2360cd799d34a83ef57de0f9

    SHA1

    993a36cf3db4dd911618c6f182426c0fd7576f8a

    SHA256

    c1e86fd1a89969a4e57c7180f465d191b89805affc4da97f8a33b345e6af06cf

    SHA512

    c632b0c7f9de65f8a843ff722c2bc6438ede42fea832cf187f69319da297f16e797827dae0c4765f8bc51ec52ea297b93bb42722a7786900312d6828162b6c14

  • \Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    f0c01eb924c4389d1f6a9ca3a9bfaa49

    SHA1

    6b2abc0cac48a5dfbc93a1a054eb27a07151f090

    SHA256

    380c9591dc8fc0d99fb11abf5af8a6cb8d363d143ac0cb75882ed10e28ed999e

    SHA512

    49e06635a0eb798c3b4e99e862379c98a698579fef9f27a8d94459e2214bcae6fdb04ec0bfd4f4250212f58d61b71883da44e477ea406048cbe5a70ba56ffb10

  • \Windows\SysWOW64\smnss.exe

    Filesize

    2.3MB

    MD5

    5990d4636f4f4564b8fb5a480396a718

    SHA1

    b5cf9467965bcd9bd41dd4f32c11b18230839ab6

    SHA256

    d33eee53a3f55b56decf7dbb9425377680892ee15b15b463ccb410a09398e11a

    SHA512

    f1161e83031db6124ac3027a198984cd6653ca7a453c27780c70ab24756291c8c9c9fd7376736545a8d065f0d16998d200e054c988c135799aec5c20fdb3f737

  • memory/2756-58-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2756-62-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2756-76-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2756-74-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2756-72-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2756-70-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2756-68-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2756-39-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2756-66-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2756-64-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2756-40-0x000000007EBD0000-0x000000007EFA1000-memory.dmp

    Filesize

    3.8MB

  • memory/2756-46-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2756-60-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2756-48-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2756-51-0x000000007EBD0000-0x000000007EFA1000-memory.dmp

    Filesize

    3.8MB

  • memory/2756-50-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2756-49-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2756-52-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2756-54-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2756-56-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2880-37-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2880-29-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/3004-0-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3004-1-0x000000007EBD0000-0x000000007EFA1000-memory.dmp

    Filesize

    3.8MB

  • memory/3004-31-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/3004-24-0x0000000000200000-0x0000000000209000-memory.dmp

    Filesize

    36KB

  • memory/3004-26-0x0000000000200000-0x0000000000209000-memory.dmp

    Filesize

    36KB

  • memory/3004-13-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/3004-32-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3004-30-0x000000007EBD0000-0x000000007EFA1000-memory.dmp

    Filesize

    3.8MB