Analysis

  • max time kernel
    115s
  • max time network
    51s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2024, 04:39

General

  • Target

    5118348996d2113431a0fbc788107b6796eb7348a167e7d5059ea0aeba334fa0N.exe

  • Size

    119KB

  • MD5

    ca3a5b2d4515c8e32b1d16a74bbe5e30

  • SHA1

    4d00c88d5e6c66e2d8508121188fb2bdc3bb8579

  • SHA256

    5118348996d2113431a0fbc788107b6796eb7348a167e7d5059ea0aeba334fa0

  • SHA512

    10714583c60fa5b554e5067e30366b932eea74ace6fc886d26911d84d0e829cb1ef2cae355966e316e9cfff76945cf0d40279f00665626d04c2bcc16aaf9242c

  • SSDEEP

    3072:EOjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPh:EIs9OKofHfHTXQLzgvnzHPowYbvrjD/E

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5118348996d2113431a0fbc788107b6796eb7348a167e7d5059ea0aeba334fa0N.exe
    "C:\Users\Admin\AppData\Local\Temp\5118348996d2113431a0fbc788107b6796eb7348a167e7d5059ea0aeba334fa0N.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2532
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2728
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2740
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 964
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:1068

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    731033991051bf2b3793d5968f511bdf

    SHA1

    3511db62ad09543fedc239e1732325c6b20808b3

    SHA256

    b908c56261bbe4c68a22f94cd2b4e07c116388ff3b6d8d4e52aadc4f8a0b947e

    SHA512

    e9caff9ee63b8113d349d501b748a208f54ce400099b1cdf7ac6fb5c7826da9ca6af1a33be1b90a813650f64af725175254a905d8ba28bed01e0492502df9a0f

  • \Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    098a5dbb76dd69b7eda4fddcfc1ff84a

    SHA1

    06499fb7999c025ba1c88746be1ee5b6a99e3e14

    SHA256

    749753255712b0f61f14c3c1c261f47ea150802d0861254d0b619846e8f9737b

    SHA512

    bad6823050637cbe092fc3cd0b8d1975b2040df62e4d94db03283bdec7ee6c5f4fd9ef52a35f4a1f6b2f4ce93b37339fb6754ac6aaa8a1a323ca407b31ed8442

  • \Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    63f3ac4e70def7fca373cb40784116ee

    SHA1

    45bcae4f4a45807780a097f638a66b428bb61a2a

    SHA256

    f9f8b97dfb57cfdc8864e55ab82b40c96ed5f5d35c4aacebe98a675b2b604b1a

    SHA512

    9b3a637e8613ffa3574b1fd6799de6ae39c5754f252f73058f80cc6bcf5fdea828bb43e6d2704bf5edda1387c61a6eb882defe4144a4c738106510b40e81b5f4

  • \Windows\SysWOW64\smnss.exe

    Filesize

    119KB

    MD5

    2021ef16bf589bc9b5a2e618d0e1616c

    SHA1

    69ddcd5fa74156988b3acda36c7d7cf6fba872cb

    SHA256

    3a779fad3b52fc934104a5b4c6273ae3d28e92f3bbc9ea635f02d409b7163678

    SHA512

    b5bcb4c8c737ac600050c7fbf8cf295867dbbc3ddcc06d9d04c1a4ad52797de4d372ff3fe66062592b4d605d486aa93a660713f03b58bc6140cb3a7d8d65b957

  • memory/2532-27-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2532-0-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2532-26-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2532-18-0x00000000003D0000-0x00000000003D9000-memory.dmp

    Filesize

    36KB

  • memory/2532-12-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2728-28-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2740-34-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2740-41-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/2740-42-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB