Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-08-2024 14:46

General

  • Target

    0c4468c5265d7ef68328489ed4202940N.exe

  • Size

    195KB

  • MD5

    0c4468c5265d7ef68328489ed4202940

  • SHA1

    7d1932c47d635bb6d9c5330f1393f5cd2ebaf5a4

  • SHA256

    acea1a148b8d28bc10cab35df1ccfb6b8bc43faa7aa41ed08615a6034f9f6d53

  • SHA512

    ce36ee1e2f57bc989f63e62b3626036748c82524e2cc5ec2500aa3ae120c3a7aa482a4550764947f0d0f0203868533cad34fa8d722ec79640403ecfd617662e2

  • SSDEEP

    6144:kIs9OKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPFsEPAsKCyOW:lKofHfHTXQLzgvnzHPowYbvrjD/L7QPo

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0c4468c5265d7ef68328489ed4202940N.exe
    "C:\Users\Admin\AppData\Local\Temp\0c4468c5265d7ef68328489ed4202940N.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4792
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4624
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:3180

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    c790702a36576df20fca5c4408b954d0

    SHA1

    1f048006aa772acd95f8bbbc9bd39f8fefff7c87

    SHA256

    aa6a7b78639cd3aec850bd646810569fa8fa78a1ed555b28296bfabe6462be29

    SHA512

    355e4cfa959777c6f3870a2770e6949e528fd9c3747e2ac3cf1c3979ece1a23a3964d295fa3c4906729185f0fbc687492cf3205fa160e6e111639af4728f49d6

  • C:\Windows\SysWOW64\grcopy.dll

    Filesize

    195KB

    MD5

    fd9e175b667af2144ad91c50f0d94638

    SHA1

    db51b9335f30798e7d4096fc8497c9b8fa1a0bf2

    SHA256

    1eab96cd298b55e21510c7b80bd0f9407f449840214a9e228ed14db7ce60e4fc

    SHA512

    7c5ad2d529dfabe4f8d8cb0d4df46c0e55009fb6e61f4ad630baa3e27f2b236b060d5d058cda0dda48103ad1d10bcb38b638107fc5de2b98e7881364da127efb

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    f6a61996a39d986d45eab77c4ecc6cd3

    SHA1

    241191ebcd77f6cabaa6719845490814e3609cb6

    SHA256

    928b77c999f9d272c5ff8a7299d6bcfeba63512e7bf2f6c2b95ac2a636a49cb0

    SHA512

    21b8b52b998b9c26ea283935b3f3e7978791c733ff4275720f5992d90c598358cb75978747514307dde7d81595db820bb839587ebc521556323187efb9f41ea4

  • C:\Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    be3043b0bf3d2f6e5ad1280ca0d9873f

    SHA1

    01f4c986d96225d698939ed0ff0561ee90deefdf

    SHA256

    b3fc8db77862f600fc6aba4cc1e0ca7acb14ee095b897117f9fc3b3fc273f5a2

    SHA512

    af3a820478d1e8ae47a2dc2386ab6f9e45424afdc082e3358e167eb0f6ee3d44c8519e09379f7c9f11b25ddada8d8bb55057bc098802ed3b2a04224bd7e6425a

  • memory/3180-30-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/3180-37-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/3180-38-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/4624-25-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/4792-0-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/4792-12-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/4792-23-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/4792-24-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB