Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/09/2024, 10:01

General

  • Target

    21ca732af9bde42e3f5ff3327f23f2e0N.exe

  • Size

    137KB

  • MD5

    21ca732af9bde42e3f5ff3327f23f2e0

  • SHA1

    d6f4309e9c9f58a9b3c6be1abd482a6ab60cfa70

  • SHA256

    17775ef2cad153959a36e134e47f4cd731ee11b5e724fa53823eee3a5b026b57

  • SHA512

    adf52ae5ef305b1054aa7f10340e6215c821d78d59e864c21c426b2d1e8af5ee726c9b1b941918f88fdd36c145e58ce1ba295786315bdd60aa1692b4e3ca8cb9

  • SSDEEP

    3072:NOjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPV:NIs9OKofHfHTXQLzgvnzHPowYbvrjD/m

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\21ca732af9bde42e3f5ff3327f23f2e0N.exe
    "C:\Users\Admin\AppData\Local\Temp\21ca732af9bde42e3f5ff3327f23f2e0N.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2412
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:5064
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:3900

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\ctfmen.exe

          Filesize

          4KB

          MD5

          d95af1e1cc646661862097175becd2d9

          SHA1

          05d1ec604c8abc479d1a07bd05c284a816504183

          SHA256

          91de73c7b6f53c38f147957dcf92c8cdd43fbf5d5a534166aa7c955606ad03a4

          SHA512

          f96a0af7f81cec93841553b709f3cdd8b3671e2e89cf831dfef3ee24afcf09276bfb4eadded46730dc2e517a1f45ee9f9d1d40bdd645a8c6749832d70843829b

        • C:\Windows\SysWOW64\grcopy.dll

          Filesize

          137KB

          MD5

          64fb0e1ef0f0ff7cfba0b5bb09d644db

          SHA1

          9b84d4e5bc107b804e0bb4b87b603af124bd9522

          SHA256

          75b24fe91689f3f325eef733a67bfaa831402910d589adb85f9744432b7cd938

          SHA512

          29f9b4f72c8d0504242cb8e9e3a4a5ed2956c880da402def7954efb8ded94867b8666c7d131a60af094aa89369418d7dd288234a4541cf47f7cf62279398e949

        • C:\Windows\SysWOW64\satornas.dll

          Filesize

          183B

          MD5

          5775ce9ae88ef8507cc9d1db543b5897

          SHA1

          f7e86292887eb9c53e724077fa8c4a01ce9e2e00

          SHA256

          18d2b5a15122b314bc23928fef2662f4416c3fc005cfe759a4d4eb721d89df47

          SHA512

          c05aff5b5ed13638bf80043d0d65ed1e2a2f629cfec828c96edabf20162b1f67f7099739b90f628817968b18c33d53c7439a2294415df8662eae83dbccd8f751

        • C:\Windows\SysWOW64\shervans.dll

          Filesize

          8KB

          MD5

          563b0ca3d5b65eba104e553d31331ec9

          SHA1

          ae31b9c0464eeaa2289bf0ef1bf349eb53e8c704

          SHA256

          d8aba63cb00825d750e9ba790c78c3b1226268b39a108cd7d4c9f3c649b82b01

          SHA512

          7673e7bb6858722fd5d55d0691391ebbc96637461669597189f818532ccd22a7a628ee8961b708c69e4a47c0cf8ae8ac5fa672dd943a065b9ede87f6cea6aabd

        • memory/2412-24-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB

        • memory/2412-0-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2412-23-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/2412-13-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB

        • memory/3900-30-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/3900-37-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB

        • memory/3900-39-0x0000000000400000-0x000000000041F000-memory.dmp

          Filesize

          124KB

        • memory/3900-40-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB

        • memory/5064-21-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/5064-29-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB