Analysis

  • max time kernel
    118s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/09/2024, 06:08

General

  • Target

    09bfe411ae0dae8d0d30e10cb69b2290N.exe

  • Size

    119KB

  • MD5

    09bfe411ae0dae8d0d30e10cb69b2290

  • SHA1

    d2d787794bfc3204318e58e16d6a3a25c4c53798

  • SHA256

    5428b3dffd1b56290c79d25dc6836d9c2e2f1a8558f974ca7b53941eba818c10

  • SHA512

    a168df83eaa8cb9aa187b2202a401c4e43ca5d0227686d7b29c0d9301aa12fe4d7c969bd524b51bbf5ef70f2de917ee9641b2f587b15d42a1a95d4c9c56bd130

  • SSDEEP

    3072:NOjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPh:NIs9OKofHfHTXQLzgvnzHPowYbvrjD/E

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09bfe411ae0dae8d0d30e10cb69b2290N.exe
    "C:\Users\Admin\AppData\Local\Temp\09bfe411ae0dae8d0d30e10cb69b2290N.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1908
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3844
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:4412

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\ctfmen.exe

          Filesize

          4KB

          MD5

          85d28423d5ea44b18da9be0a2de7bad7

          SHA1

          49e8aceeb5e7866c06986c1cf968cf27f440c808

          SHA256

          c7f9734ef14d1e4f90274927a83e12af0a7d8db372be75545e34203983eb3c33

          SHA512

          0dcd72b8b30e077eda6e73917c62b007f369aa16a93c9996bd29986838f6fdb693edb5d12b3ec32341cd16862cba3a95c8998dc50dd0694fca9d342dcda561c7

        • C:\Windows\SysWOW64\grcopy.dll

          Filesize

          119KB

          MD5

          0ef2d09ff4114e30496c84dfc6d517d4

          SHA1

          0cb2becf12b7f8271e30e22b6bf11815bc7360b1

          SHA256

          fcfe00bdc9ac0c2e1c02dd1dd6cfb1c9135626c1b7da3598017e0242d07a35cb

          SHA512

          87c4e91fd0086ffdd2779c6257e3e662be7f30bffb99fca7907cf6bf31332452ef93e491380a55ef2d1ad9174a25eae0c643140598dfd1b802cd046b90db0fbb

        • C:\Windows\SysWOW64\satornas.dll

          Filesize

          183B

          MD5

          d7d31ad654ed3e7b3ceb6934bb579be1

          SHA1

          794801646348bc60d18627834ac5ea754f992c7a

          SHA256

          0d9e655d491d34da2748422db88bf33515257719546b6f64cdd5147c3dc50a10

          SHA512

          434a13a8a023c0141bcbaedd10d218ed2762f54f3a4dcaaf0202963f23eba3d20cf4a2b0c5e0269c5e0c0858f72cc611e624158147e5ad90d9476031aa8280a8

        • C:\Windows\SysWOW64\shervans.dll

          Filesize

          8KB

          MD5

          72a7805e9306dd719e26d1efeaf32016

          SHA1

          f315fd4a1f6670bba17fe340afc6257617a4725c

          SHA256

          f068bc4a1a25c8b4e9a7f04a1ce414489685f3c69521761cdaa115f4a24ee1f7

          SHA512

          7940c62080382b7e7c4db38ab0a8f7571e0961f9d7c322f20a3c58f37f4a9add683afc5ea1a30e2223bb3496d16cc834ec20a943797c62597a5251bd9c63e4e4

        • memory/1908-24-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB

        • memory/1908-0-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/1908-23-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/1908-13-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB

        • memory/3844-21-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/3844-29-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/4412-30-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/4412-37-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB

        • memory/4412-39-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/4412-40-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB