Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    03-09-2024 05:26

General

  • Target

    e649a5c8838d9a9e17216c8442a0ee49002f8cc4007eb211e5b7c3e86ed1c18b.exe

  • Size

    2.4MB

  • MD5

    ceb194e4413b99123c5ed4b4a5f26f14

  • SHA1

    5d12c8afaaf0e776b0362d4d6c3a649ccdd9001c

  • SHA256

    e649a5c8838d9a9e17216c8442a0ee49002f8cc4007eb211e5b7c3e86ed1c18b

  • SHA512

    0dd5683b8198f4f02a69b40dfd9ff5f42aa9cbaacd27f096374cac2b4c546208d481f143632b635c20e43e9a9f7eef47d5ad340559f66592e3343d6a11bff4ab

  • SSDEEP

    49152:tR/laMbYAp7s5nceEv7MuGOe4jPyTmE7ZIIKR01GSM8prnoo:tRNvpAceMjGL4jaCE7ZGCxh

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 17 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e649a5c8838d9a9e17216c8442a0ee49002f8cc4007eb211e5b7c3e86ed1c18b.exe
    "C:\Users\Admin\AppData\Local\Temp\e649a5c8838d9a9e17216c8442a0ee49002f8cc4007eb211e5b7c3e86ed1c18b.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2960
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2976
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2196

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    e94aec8419f4ee3f9d0976c19fcff2d3

    SHA1

    a589e380788e3da6990892c1cf70756d957adcc3

    SHA256

    7596f9b3cd218218fef4a69baa5133cfd4641d18d7eb860fc98241a0d124af47

    SHA512

    ccf6f2eb7df39d9fca988d39166f7d48e6dca326ccb0a4dfba33165e5e1b88bc0f4aa5fdc6780fb000f6d4bb36d53f531d3007c812b80f81acdbc7c2cf293b4e

  • C:\Windows\SysWOW64\smnss.exe

    Filesize

    2.4MB

    MD5

    e82f6dba3ca41e712a6731d54e4d7b38

    SHA1

    82eb3a6f762f6e12df9f936b45b509d84235ebf0

    SHA256

    3555f97417c6e4ffe4a5fab2cab285d5726be28d6afd1e3e49895412f418a8a3

    SHA512

    62a83acf4b7376ff5cb29af47ecc9d42eca3c181e736a157cdfa14205135b90102bed9be66c7133468209c0f401ce70d905f585af6d2b767ba937e9a96087bf0

  • \Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    85474a2a2604393c7cf29925cb6d0c52

    SHA1

    1ca8c9a0051bd949b4aad1ff42a9a692c43948fb

    SHA256

    583fed7aa8e1f9bba2d05b422464e9f086561b5d1b25d862bd380cb4bd1b319b

    SHA512

    c2dc88d2396f72a8cf6d38f391415da8b4b770a77891df08900c51d08707fa107c50b079c25146ad33baf4b8e1af2c9158e4ce5caa502b717b466539983084b7

  • \Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    deed2bd56a6ae29d11e7c0ae1a4d75bf

    SHA1

    918a2dc40704e3821cec2304af59f0366df31a5e

    SHA256

    ace9ae2b3e14666ba76a6a85566aadb9851ce4247af0c61d1a50663bdaf021a4

    SHA512

    c5344ab527bc176cdf3a9f93750d2fd08275a518cca32c72b3e5ec79f327d06b0af5e505e1363dd2c17a720e279a6f3b6ad1722a7cc811e0d7ee5c4337f42a1e

  • memory/2196-58-0x0000000000400000-0x0000000000DCC000-memory.dmp

    Filesize

    9.8MB

  • memory/2196-62-0x0000000000400000-0x0000000000DCC000-memory.dmp

    Filesize

    9.8MB

  • memory/2196-74-0x0000000000400000-0x0000000000DCC000-memory.dmp

    Filesize

    9.8MB

  • memory/2196-72-0x0000000000400000-0x0000000000DCC000-memory.dmp

    Filesize

    9.8MB

  • memory/2196-70-0x0000000000400000-0x0000000000DCC000-memory.dmp

    Filesize

    9.8MB

  • memory/2196-68-0x0000000000400000-0x0000000000DCC000-memory.dmp

    Filesize

    9.8MB

  • memory/2196-37-0x0000000000400000-0x0000000000DCC000-memory.dmp

    Filesize

    9.8MB

  • memory/2196-66-0x0000000000400000-0x0000000000DCC000-memory.dmp

    Filesize

    9.8MB

  • memory/2196-64-0x0000000000400000-0x0000000000DCC000-memory.dmp

    Filesize

    9.8MB

  • memory/2196-38-0x000000007EBD0000-0x000000007EFA1000-memory.dmp

    Filesize

    3.8MB

  • memory/2196-60-0x0000000000400000-0x0000000000DCC000-memory.dmp

    Filesize

    9.8MB

  • memory/2196-44-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2196-46-0x0000000000400000-0x0000000000DCC000-memory.dmp

    Filesize

    9.8MB

  • memory/2196-48-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2196-49-0x000000007EBD0000-0x000000007EFA1000-memory.dmp

    Filesize

    3.8MB

  • memory/2196-47-0x0000000000400000-0x0000000000DCC000-memory.dmp

    Filesize

    9.8MB

  • memory/2196-50-0x0000000000400000-0x0000000000DCC000-memory.dmp

    Filesize

    9.8MB

  • memory/2196-52-0x0000000000400000-0x0000000000DCC000-memory.dmp

    Filesize

    9.8MB

  • memory/2196-54-0x0000000000400000-0x0000000000DCC000-memory.dmp

    Filesize

    9.8MB

  • memory/2196-56-0x0000000000400000-0x0000000000DCC000-memory.dmp

    Filesize

    9.8MB

  • memory/2960-0-0x0000000000400000-0x0000000000DCC000-memory.dmp

    Filesize

    9.8MB

  • memory/2960-1-0x000000007EBD0000-0x000000007EFA1000-memory.dmp

    Filesize

    3.8MB

  • memory/2960-20-0x0000000000260000-0x0000000000269000-memory.dmp

    Filesize

    36KB

  • memory/2960-34-0x000000007EBD0000-0x000000007EFA1000-memory.dmp

    Filesize

    3.8MB

  • memory/2960-13-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2960-29-0x0000000000400000-0x0000000000DCC000-memory.dmp

    Filesize

    9.8MB

  • memory/2960-26-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2976-36-0x00000000006C0000-0x000000000108C000-memory.dmp

    Filesize

    9.8MB

  • memory/2976-28-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB