Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/09/2024, 02:53

General

  • Target

    d592d4b8294185793c33562d54931048192717869399de71517d73d5f29a9299.exe

  • Size

    2.3MB

  • MD5

    4f788fda7994fd4cdd3611b30bfd4663

  • SHA1

    a52ef8fc668943131b4d0ac875e4722e2f0b035b

  • SHA256

    d592d4b8294185793c33562d54931048192717869399de71517d73d5f29a9299

  • SHA512

    8bd9cbe9a6322eaecc50d4e4c2156696593d0b1bc53416f00ca5005642d0bb48e57a26ce884ae6212d6026293684051b026592d804417bb0d70653a466e82505

  • SSDEEP

    49152:3jvk2d9rJpNJ6jUFdXaDoIHmXMupzh72lxakn2YpHdy4ZBgIoooNe:3rkI9rSjA5aDo73pzF2bz3p9y4HgIoov

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d592d4b8294185793c33562d54931048192717869399de71517d73d5f29a9299.exe
    "C:\Users\Admin\AppData\Local\Temp\d592d4b8294185793c33562d54931048192717869399de71517d73d5f29a9299.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1100
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4304
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:3372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    a1954777b736d25ce0fb6884decb0745

    SHA1

    2c784c8a13ad1206305bc2ea13ca041e5b751ecd

    SHA256

    33603adc57f462fbaa788d82476545f1204617eaa68200111d6ea2d9ec7aaaf1

    SHA512

    8d699b1840845fe9a1418c2ca72e70c9e58f6c18c5d74e00a53aff4cc11d12d689eb7043d571e39d46d68b4704e82d6ba1a5425495ec7b419cf7dbee9d0a078b

  • C:\Windows\SysWOW64\grcopy.dll

    Filesize

    2.3MB

    MD5

    568c1a3a38e83d1e249a625fcfc773c1

    SHA1

    fd6844cd827fc3300e312d899880f321c9a49c84

    SHA256

    eb9c1dcd9c1fc542cb941f12ceaa33b17b40d5a3bcb3a0c4b82c601ca4e87bc1

    SHA512

    9f554bc64f896a85461775e9fe7d76beb7095ce27e6401f64b228ec59140bfc4f8f44a88439ebbf9eb70a67375e629ba27f7a06c24f50ba97c4cc70018741457

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    d2d3e41349e0d56dc1bf933bd0f4d3c6

    SHA1

    859248ba9788067658e512a6114df6493d58b705

    SHA256

    2bfab147d9d2184229c25053cd24c042471bedee6dd610a898ba8fb43ec30e52

    SHA512

    25e523dbe58a88f1487209bec35c4e7f20c9d490f05f48c878fe8f3a8d83efc4a46471b0031e697369f628dd6c3826ae5ecb4a6c686c1fd6204b41183ede5cb6

  • C:\Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    9e1c1b2571f695d553ca53f57ea1320e

    SHA1

    8d59e0519ecbf7c88e9e24d8eb3d31aeab7c711c

    SHA256

    d561bf33263ea895796a80c308e9d99f73af9fa9c6166c16df2841d421956360

    SHA512

    ac6e86e15ca9a4da589bf770ff05e8d1dd9a5a08a28cabfba84e072f3e4523db9b113dd3255a1bfe39376aa6ecd8d7fc5c63646825a32cbcb6fa3f96a487cffd

  • memory/1100-30-0x000000007FA70000-0x000000007FE41000-memory.dmp

    Filesize

    3.8MB

  • memory/1100-1-0x000000007FA70000-0x000000007FE41000-memory.dmp

    Filesize

    3.8MB

  • memory/1100-14-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/1100-0-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/1100-25-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/1100-24-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3372-42-0x000000007FA70000-0x000000007FE41000-memory.dmp

    Filesize

    3.8MB

  • memory/3372-59-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3372-33-0x000000007FA70000-0x000000007FE41000-memory.dmp

    Filesize

    3.8MB

  • memory/3372-39-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/3372-69-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3372-41-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3372-67-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3372-44-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/3372-43-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3372-45-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3372-47-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3372-49-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3372-51-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3372-53-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3372-55-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3372-57-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3372-32-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3372-61-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3372-63-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/3372-65-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/4304-22-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/4304-29-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB