Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/08/2024, 19:47

General

  • Target

    6bb63623ec40ae9f275e8a89d36bf9b0N.exe

  • Size

    2.3MB

  • MD5

    6bb63623ec40ae9f275e8a89d36bf9b0

  • SHA1

    40ab7e64bb68c05f3b53eb117e0e903289e69683

  • SHA256

    69f2882e87931e204aa907739d35fc9f50689fa3a2a2290f5b868745fc2c6496

  • SHA512

    043e1d43ce7da78c6c60085e1827883ea469b0e100fa88588f4957a87a64a16f5eb5a5f117ba4e0975147145c0dca944aeed70911046d4f7ddbaf11824944c52

  • SSDEEP

    49152:Qjvk2d9rJpNJ6jUFdXaDoIHmXMupzh72lxakn2YpHdy4ZBgIoooNe:QrkI9rSjA5aDo73pzF2bz3p9y4HgIoov

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6bb63623ec40ae9f275e8a89d36bf9b0N.exe
    "C:\Users\Admin\AppData\Local\Temp\6bb63623ec40ae9f275e8a89d36bf9b0N.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3416
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1672
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:4544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    57b61249d71d5ead5f03cc7e019f6808

    SHA1

    5cfe50d4fa08590d241349ee1af7360444b5a404

    SHA256

    befbbcb276f0717fd68c55dee0bc9b64449cf1305417cc62ffd5bd2e036d42df

    SHA512

    70e1e8ce962be545966bda81fe2c9d700b9c1275b7cba90937c06737276709ced4d47d3330c533e00eedb297186328e80125a31536bd4ba1ea885b9a13f07d03

  • C:\Windows\SysWOW64\grcopy.dll

    Filesize

    2.3MB

    MD5

    226984ac8871b70b2c581bd768e91067

    SHA1

    e9eb14302c126f01b1a5a48df4ae7cabce2c8ac7

    SHA256

    9981751024af67a6dd9873b7da70872efe1a17ef34ceef0f35daf0873311024d

    SHA512

    4abd1a96375fe6109847d4ac17504e878aed0ed0ef5e793531bd22430c880fbce3eedb64b97725c92efeba56801708ec746fde28b71252d8e3e9896b4f8f23a3

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    82badc84f462252756d527896ca85fd8

    SHA1

    dda9ceb88d7fb68cb69909347e5226590b0a300d

    SHA256

    efa18359a6147873468e97821a6c60448b71cfc89deb7f1d991a16ba6eb720b9

    SHA512

    aafd0e51f0af743fd5a64c1762a46e4ef82f100ad44fc1d3a200e9ce47480fac3af1e13552437807e2e9b7ac11e67f842e6ed35a23c7e3677cdc693d83d71ea8

  • C:\Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    9e230c061303a11bf0c1d6fd68188c9e

    SHA1

    f92ab77c987f04b74697dcb8d8fbb5a9995aabd0

    SHA256

    36171ad271f01af2781ce3ef357ad3e0c5bda99ccdbef64a60de0a4b82c9c10b

    SHA512

    ed9f24bcceef169a8e7adb1ef6db1c0999ba606c4c9e590521a41fb90cc29ba6bea0f5ebf9ccabfee2fd1b674fee42abaee6ed844285084f9ca78780b51bf493

  • memory/1672-30-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/1672-22-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/3416-31-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3416-0-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3416-1-0x000000007FA70000-0x000000007FE41000-memory.dmp

    Filesize

    3.8MB

  • memory/3416-32-0x000000007FA70000-0x000000007FE41000-memory.dmp

    Filesize

    3.8MB

  • memory/3416-25-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/3416-13-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/4544-45-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/4544-50-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/4544-34-0x000000007FA70000-0x000000007FE41000-memory.dmp

    Filesize

    3.8MB

  • memory/4544-42-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/4544-43-0x000000007FA70000-0x000000007FE41000-memory.dmp

    Filesize

    3.8MB

  • memory/4544-33-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/4544-44-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/4544-46-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/4544-48-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/4544-40-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/4544-52-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/4544-54-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/4544-56-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/4544-58-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/4544-60-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/4544-62-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/4544-64-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB