Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/09/2024, 11:43

General

  • Target

    a6a848977bba93c6be2d3ce269976970N.exe

  • Size

    2.3MB

  • MD5

    a6a848977bba93c6be2d3ce269976970

  • SHA1

    6717b4aadf1afcb69d8f02d63c86993f056b4c49

  • SHA256

    ed53b0add7f2cc7082fabba059ea37b09967a186aa84dbed613b13bf18582622

  • SHA512

    b10bd84447a542e89e4505abad4d536c99eac8b6aae030ac9b37d6d99829ffbec1dd63ba5e27736feb158ae82db8665c6a2de56f76e60edd836c705bc66048ae

  • SSDEEP

    49152:sjvk2d9rJpNJ6jUFdXaDoIHmXMupzh72lxakn2YpHdy4ZBgIoooNe:srkI9rSjA5aDo73pzF2bz3p9y4HgIoov

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a6a848977bba93c6be2d3ce269976970N.exe
    "C:\Users\Admin\AppData\Local\Temp\a6a848977bba93c6be2d3ce269976970N.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1376
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4708
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    39bb8b898054e368ec657e976924cb6c

    SHA1

    5f36a6167d65590e53d52e07fa91dea0554bf75b

    SHA256

    6802e84684068c510407da87dd935ad979436845bd19db232049edc141fc2e35

    SHA512

    ec47aa024012a2ab3290f66a588e1aa2712fdae389be7d26b72917ccec36b09530ed9d38a280b14e3a70ee065d847140445ed24f239a512eaf2e216bc8734aa4

  • C:\Windows\SysWOW64\grcopy.dll

    Filesize

    2.3MB

    MD5

    af05edc974ba17076dde28ca7da5192f

    SHA1

    3fcbe43673fb0cd19ef83655dcfb91bfead6f0b1

    SHA256

    1a37d0a076c992c4622cffb16dd9d9b3d82e29879238ed0c2387e242b0b247fc

    SHA512

    6e91b224fcad349094e680769c05c05b0f2292954e9941d655840e628d3ec47833519e9e2e8f62a521b649653a07b31d132a0d833e10bb29597f12358bddb40b

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    956414e925b1ce1a197b61ba8c86119b

    SHA1

    c18b1381ba56cbbb4105ea9792ab9faa59c33a7b

    SHA256

    36faa66cc149ec3d1b4224e7606e5a24a7c113cc79e3cdd4e2b1681303aa09c4

    SHA512

    6409fe07d8a83d3cbe441f6f5370b80fc074cbd6a65d6b0c07320295e01c63904651537912420e50e2a3497bb3b39d45196c0a5c570231544d7c312e0353cae9

  • C:\Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    b115d946812bdd03a3b1e4b31306cf0e

    SHA1

    51038bb776cb5d1ccad2e1638e7e0f3ce0cd179f

    SHA256

    41837411a71b3c338340fc8eb7b89776fd31b6b70247fbfaf4f11403e25e1cef

    SHA512

    75ae5859e735ce6f4ffd28f6d32612868d8f5b8e76a829f3873fa9dac9b204fe6ef01cac00073a00fe167c2d0195f3a2d8b6cfc7150ba284206a6164ca080e75

  • memory/1376-24-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/1376-1-0x000000007FA70000-0x000000007FE41000-memory.dmp

    Filesize

    3.8MB

  • memory/1376-14-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/1376-0-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/1376-25-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/1376-27-0x000000007FA70000-0x000000007FE41000-memory.dmp

    Filesize

    3.8MB

  • memory/2000-44-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2000-45-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2000-33-0x000000007FA70000-0x000000007FE41000-memory.dmp

    Filesize

    3.8MB

  • memory/2000-39-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2000-63-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2000-41-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2000-42-0x000000007FA70000-0x000000007FE41000-memory.dmp

    Filesize

    3.8MB

  • memory/2000-61-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2000-43-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2000-32-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2000-47-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2000-49-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2000-51-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2000-53-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2000-55-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2000-57-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2000-59-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/4708-22-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/4708-30-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB