Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23-08-2024 20:57

General

  • Target

    8d43d6e83e3e4e27709e9b298454d540N.exe

  • Size

    2.3MB

  • MD5

    8d43d6e83e3e4e27709e9b298454d540

  • SHA1

    8374062e516d45b49314c94295b6e68babf7204c

  • SHA256

    77d02f50be339f580420634f4ec6d2b21d0d55b9bee558a36a99680265b0418b

  • SHA512

    e7721d79c4c90c86346512ec1d69c8bcda2aa57594030d0fa9645a081d2ee95d8ed8b1c4455788f12796f864518140187f6113809c192b73f1a0f5ead64c7f8b

  • SSDEEP

    49152:Jjvk2d9rJpNJ6jUFdXaDoIHmXMupzh72lxakn2YpHdy4ZBgIoooNe:JrkI9rSjA5aDo73pzF2bz3p9y4HgIoov

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d43d6e83e3e4e27709e9b298454d540N.exe
    "C:\Users\Admin\AppData\Local\Temp\8d43d6e83e3e4e27709e9b298454d540N.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2868
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2816

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    5b67b6199247f880d8ef93ef859a560a

    SHA1

    54fe9230724044120c0a3772af11428235f75260

    SHA256

    9292304f0b025465a64acbccc752a6c0403a15c6c0ea732f1f178b2822ee0d18

    SHA512

    b9d9829142de1d4862d3ae75159b9ead5a81334ba7b003f7949dc9ff0a9fd6e3e1a865bc738110d5c97e8dc3972f7f977f74f2d60ce0d0c7bd98006705e85843

  • C:\Windows\SysWOW64\smnss.exe

    Filesize

    2.3MB

    MD5

    db3bc0f6921f4dcd837e1b44df2189d4

    SHA1

    65f0604e19db20c82475372b21487a27fea89010

    SHA256

    a35ad6499d62174759e9e3b067682e4937b0e6011b05c9a865e52321f22c6ca5

    SHA512

    608ce1f96954c99755698dd031c2cb405645dca44956ca8d2c90a57cc6c029c202322f35e64ea626923bd4eef10a2e823f24ff0e56915a7d42759e6034705099

  • \Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    daec635c7ce931c4c0c9fe972a27715f

    SHA1

    45b7d23c0f448907e80fd08128da97ceb5f8b0f3

    SHA256

    92508f2db33cbfd6cff6d4d68da0c1ac34b517c2117e3f4db455a360ba8e3e43

    SHA512

    a89f93e8e454a1357e5dd8d54f2d2ca225119281c107185a6f17d0c61ea3de1e25288619adf66e7a02d1468b0b1c8158e19d3e88b45cf8643b59aa865521c1ff

  • \Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    444adf804533efb78c58c61b8d87b469

    SHA1

    edf42b7ad46e5c2da0f5e49784cea95bf840010d

    SHA256

    e4b796f7a96d1b51de6037b20b69e4750bea9f64ac34e7c3cfb14563b178b305

    SHA512

    43f060515d971f9a673bdd0818c021660fd8d86ea2e7ff8d6710f1d4a99602d3c78fb578615a5dfcb166097d59fcd5efecddb8e5601a0f204f19e78082ce5a69

  • memory/2244-1-0x000000007EBD0000-0x000000007EFA1000-memory.dmp

    Filesize

    3.8MB

  • memory/2244-13-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2244-20-0x00000000011E0000-0x00000000011E9000-memory.dmp

    Filesize

    36KB

  • memory/2244-27-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2244-0-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2244-25-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2244-35-0x000000007EBD0000-0x000000007EFA1000-memory.dmp

    Filesize

    3.8MB

  • memory/2816-52-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2816-50-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2816-42-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2816-34-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2816-44-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2816-47-0x000000007EBD0000-0x000000007EFA1000-memory.dmp

    Filesize

    3.8MB

  • memory/2816-46-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2816-45-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2816-48-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2816-36-0x000000007EBD0000-0x000000007EFA1000-memory.dmp

    Filesize

    3.8MB

  • memory/2816-66-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2816-54-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2816-56-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2816-58-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2816-60-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2816-62-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2816-64-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2868-28-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB