Analysis
-
max time kernel
94s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/09/2024, 03:39
Static task
static1
Behavioral task
behavioral1
Sample
2d698498e586bca2a5c028d9993eab50N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2d698498e586bca2a5c028d9993eab50N.exe
Resource
win10v2004-20240802-en
General
-
Target
2d698498e586bca2a5c028d9993eab50N.exe
-
Size
2.3MB
-
MD5
2d698498e586bca2a5c028d9993eab50
-
SHA1
49a0cffec59f12787b331d1f77d6e45d478bc529
-
SHA256
e278a239f0871de08f812a0f31626ae470dbfb3250fbcf19d7ba128a7765d24d
-
SHA512
b7b3a1d5989674f6f649542ee2e859ff91c9b7fb6301ec7f6dd18b206eb5c0cb7c1edf8f7a1d7a6af93046d3964584be08fa636a195d30f661e4f5443904454c
-
SSDEEP
49152:Gjvk2d9rJpNJ6jUFdXaDoIHmXMupzh72lxakn2YpHdy4ZBgIoooNe:GrkI9rSjA5aDo73pzF2bz3p9y4HgIoov
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x00070000000234b1-11.dat acprotect -
Executes dropped EXE 2 IoCs
pid Process 3044 ctfmen.exe 4068 smnss.exe -
Loads dropped DLL 2 IoCs
pid Process 5060 2d698498e586bca2a5c028d9993eab50N.exe 4068 smnss.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ctfmen = "C:\\Windows\\system32\\ctfmen.exe" smnss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ctfmen = "C:\\Windows\\system32\\ctfmen.exe" 2d698498e586bca2a5c028d9993eab50N.exe -
Maps connected drives based on registry 3 TTPs 6 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum smnss.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 smnss.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\1 smnss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 2d698498e586bca2a5c028d9993eab50N.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 2d698498e586bca2a5c028d9993eab50N.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\1 2d698498e586bca2a5c028d9993eab50N.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\grcopy.dll 2d698498e586bca2a5c028d9993eab50N.exe File opened for modification C:\Windows\SysWOW64\shervans.dll 2d698498e586bca2a5c028d9993eab50N.exe File created C:\Windows\SysWOW64\zipfi.dll smnss.exe File created C:\Windows\SysWOW64\zipfiaq.dll smnss.exe File created C:\Windows\SysWOW64\ctfmen.exe 2d698498e586bca2a5c028d9993eab50N.exe File opened for modification C:\Windows\SysWOW64\ctfmen.exe 2d698498e586bca2a5c028d9993eab50N.exe File created C:\Windows\SysWOW64\shervans.dll 2d698498e586bca2a5c028d9993eab50N.exe File opened for modification C:\Windows\SysWOW64\grcopy.dll 2d698498e586bca2a5c028d9993eab50N.exe File created C:\Windows\SysWOW64\smnss.exe 2d698498e586bca2a5c028d9993eab50N.exe File created C:\Windows\SysWOW64\satornas.dll 2d698498e586bca2a5c028d9993eab50N.exe File opened for modification C:\Windows\SysWOW64\satornas.dll 2d698498e586bca2a5c028d9993eab50N.exe File created C:\Windows\SysWOW64\smnss.exe smnss.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
pid Process 5060 2d698498e586bca2a5c028d9993eab50N.exe 5060 2d698498e586bca2a5c028d9993eab50N.exe 4068 smnss.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\auxbase.xml smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskpred\oskpredbase.xml smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipscsy.xml smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsrus.xml smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\eo.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\mk.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\tg.txt smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\Alphabet.xml smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsnld.xml smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\de.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\kaa.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\sq.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\uk.txt smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\keypad\ea.xml smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsar.xml smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\ba.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\br.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\ja.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\mng2.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\tt.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\vi.txt smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsel.xml smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\cs.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\pt-br.txt smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknumpad.xml smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\et.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\hy.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\uz.txt smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsfin.xml smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipstr.xml smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\he.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\ne.txt smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipshrv.xml smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\ga.txt smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskclearui.xml smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\ug.txt smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\zh-changjei.xml smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu.xml smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\nl.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt smnss.exe File opened for modification C:\Program Files\7-Zip\License.txt smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav.xml smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipscat.xml smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsdan.xml smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\be.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\da.txt smnss.exe File opened for modification C:\Program Files\7-Zip\History.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\sr-spc.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\ms.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\th.txt smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad.xml smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\symbase.xml smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\ky.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\mr.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\pl.txt smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsdeu.xml smnss.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsrom.xml smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\ka.txt smnss.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 764 4068 WerFault.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d698498e586bca2a5c028d9993eab50N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctfmen.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smnss.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 2d698498e586bca2a5c028d9993eab50N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 2d698498e586bca2a5c028d9993eab50N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED} 2d698498e586bca2a5c028d9993eab50N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\InprocServer32\ = "C:\\Windows\\SysWow64\\shervans.dll" 2d698498e586bca2a5c028d9993eab50N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\InprocServer32\ = "C:\\Windows\\SysWow64\\shervans.dll" smnss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\InprocServer32 2d698498e586bca2a5c028d9993eab50N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4068 smnss.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5060 2d698498e586bca2a5c028d9993eab50N.exe 4068 smnss.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5060 wrote to memory of 3044 5060 2d698498e586bca2a5c028d9993eab50N.exe 91 PID 5060 wrote to memory of 3044 5060 2d698498e586bca2a5c028d9993eab50N.exe 91 PID 5060 wrote to memory of 3044 5060 2d698498e586bca2a5c028d9993eab50N.exe 91 PID 3044 wrote to memory of 4068 3044 ctfmen.exe 92 PID 3044 wrote to memory of 4068 3044 ctfmen.exe 92 PID 3044 wrote to memory of 4068 3044 ctfmen.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d698498e586bca2a5c028d9993eab50N.exe"C:\Users\Admin\AppData\Local\Temp\2d698498e586bca2a5c028d9993eab50N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\ctfmen.exectfmen.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\smnss.exeC:\Windows\system32\smnss.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4068 -s 14964⤵
- Program crash
PID:764
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4068 -ip 40681⤵PID:3948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5e10217bf66a676450da12c00d26b0fa9
SHA1234a0ec86b85f013dc9cafecc54975be8862e986
SHA25615be2710257c5e4140392d5c5a1c1945b8eb9737a9b0d0c55a189f38668929b5
SHA51234652fbcd40b9a83c46690bc1dbbc853387e96090650d30f9b589d8e93e4643fe0b349a54233624397d4999f5aaa79dee78b206f85d4c76f47969b18d80f13e1
-
Filesize
2.3MB
MD5a889098b10f8383c63ce9f9668c23210
SHA1fc9723241ffed6a636ac30a0d182914618fa1b93
SHA256f95d2695c61669b189618c28ecc282223bc7f5b2f6fe19bb3ceec62c98e1e73b
SHA512f52eada4a769de9db990b86acbd946062ab1976d68819c353b06f422e2df1be94a3a3d4013600dc0f0208ece06c376fd14c140d97195b696df57376c50432e8e
-
Filesize
183B
MD524344e05c615530ba7e4dc1dc1f41caa
SHA1eaf641e45d35aaae86bf58bb68001e92a9d9b15d
SHA256cbc7a6571438a1ef27bb131f49af0aaa3a41af4b331a128e954a0b5e4e43670b
SHA512c9c7db9fa77f2dde7fe127ab7f101a93956ffce2963e222fc5f2532d84c381f78b57cb39a7a7545196db6808cfd4689e1ac3bb1d8ad63458bb32bfcdc2203cbb
-
Filesize
8KB
MD5aa90fee6a916dcff814e77d4d0f01a0a
SHA1926841b386e40c6057b7f0a63c860535ff7166e5
SHA256afddba6ce35c8c59e2702c3208a0f4674095bcae656a42e3ea9a3f80a11add81
SHA512ccb4963056664e7c2c9427cd6d040d977085ae290bc17c5f2241ab08a8b1f83df0f4d7b6b7d0be95112362d54887cb3046a3afe9e4fb944d4f4a386698033383