Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 03:46
Static task
static1
Behavioral task
behavioral1
Sample
d9c849ffc68665554cb8ff0c904d930c1842286c50ceb2a8b52a5b3baf8fb7ea.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
d9c849ffc68665554cb8ff0c904d930c1842286c50ceb2a8b52a5b3baf8fb7ea.dll
Resource
win10v2004-20240802-en
General
-
Target
d9c849ffc68665554cb8ff0c904d930c1842286c50ceb2a8b52a5b3baf8fb7ea.dll
-
Size
8KB
-
MD5
2f3879016983b0ac4f453d061161f7ad
-
SHA1
d076d26b6a02c114d90a4dec94a062c2182b80f6
-
SHA256
d9c849ffc68665554cb8ff0c904d930c1842286c50ceb2a8b52a5b3baf8fb7ea
-
SHA512
2b1df3afd43653e593b7de5a2f94806edd0c7cfe349d30a0b39c83e333cee850c89db381f482bdda66f2bcacc9e1e5c06bdaf85f719095195676ca527dc5e2d3
-
SSDEEP
192:Uh4SFyvWohE5xf6YUBSL63SUJqtMblWN:UO+ohE2B13NJqtM
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ctfmen = "C:\\Windows\\system32\\ctfmen.exe" rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\satornas.dll rundll32.exe File created C:\Windows\SysWOW64\satornas.dll rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1920 wrote to memory of 3556 1920 rundll32.exe 84 PID 1920 wrote to memory of 3556 1920 rundll32.exe 84 PID 1920 wrote to memory of 3556 1920 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d9c849ffc68665554cb8ff0c904d930c1842286c50ceb2a8b52a5b3baf8fb7ea.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d9c849ffc68665554cb8ff0c904d930c1842286c50ceb2a8b52a5b3baf8fb7ea.dll,#12⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3556
-