Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 06:29

General

  • Target

    3ab79ea70aeb605157c65bc5fc83cc803c8eb15e65780ba1d68807fdfc31ebffN.exe

  • Size

    75KB

  • MD5

    bcca47da54d142c7b9457c33a6ef6480

  • SHA1

    3b878e2149febdb5b07ed2f0c0ea61817cc1830e

  • SHA256

    3ab79ea70aeb605157c65bc5fc83cc803c8eb15e65780ba1d68807fdfc31ebff

  • SHA512

    8b639d4d1cc25f64b38c328736349db5f5fd4550928e561eabbec0432ab8abb1713c5d51eea81c75a9676f4a03f57fbebde4d33b79614d936d5b0f72c5c002d9

  • SSDEEP

    1536:1x1Qja7luy6y0s4sqfkbnAKBOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3B:fOjWuyt0ZsqsXOKofHfHTXQLzgvnzHPp

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ab79ea70aeb605157c65bc5fc83cc803c8eb15e65780ba1d68807fdfc31ebffN.exe
    "C:\Users\Admin\AppData\Local\Temp\3ab79ea70aeb605157c65bc5fc83cc803c8eb15e65780ba1d68807fdfc31ebffN.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1100
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3928
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:1752

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    8d613d98cf0d5e88bd6270baa7005ea7

    SHA1

    64899679336f1fec859aae68356d9009abc40d1b

    SHA256

    668d898198e1157b0417d6b583cfad713be38fc30268033680bebaa9ffb5aab8

    SHA512

    58a964cbdb42501e937b453ef31c6e6bd3386824aeda52d5eb69c35fe3fdd61104ecebc499b3b64184ce7d8c3a0ab7914df94838f1e1351964cf48461855d759

  • C:\Windows\SysWOW64\grcopy.dll

    Filesize

    75KB

    MD5

    598399ee346ba2666dbe5af96079adb6

    SHA1

    dc406408dc6fea1b2cd67aa85fa19de6f44721bf

    SHA256

    abe752007aa1cbdef74328e8aa319039ad9849366912c242194a399e2d43823a

    SHA512

    6bb555a2fa8e21ae725a016d92d40023533275c40bb36a4e88c94a9338424d2fcc39932ca4def808d74ef3eedf1f84235fed3b33f144d1518ebf2b9e6a8c2e53

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    7f2a546f54a53c09ae9e0b4a5d044988

    SHA1

    bcb8bd6cd2457aee3ecc392559d9c45aa93c0860

    SHA256

    ce442b543f8533dc46dd0ed9aac3cb5019a2f52c7005d9a958c622831948de2b

    SHA512

    91417d6063fd83fe8c1ec2e7cfb59d48fced7544c32494cebf041be495d44a6d139bae0551a922b8dea7c220942e574f48683d284147120478303c3609500b27

  • C:\Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    d5afa26eac31ba48a8f9b79d3f203eba

    SHA1

    9fc9c71462f99ab3249462de7cb20aaada3dc730

    SHA256

    57636a5980196dc050ce14c6ecfc48d52c28f6bcd6342e7ebe3f58deef71bd10

    SHA512

    a98548066811fe378d1d60cbbcf11ab26e560d1627ea5dc44f1588f060d47e62e7f2380a55e2fb88843053c0bcce7c9fd8599073cb95e9eae87717192ca4ef6d

  • memory/1100-11-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/1100-21-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1100-23-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/1752-37-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1752-43-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1752-35-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/1752-55-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1752-38-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/1752-39-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1752-41-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1752-53-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1752-45-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1752-47-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1752-49-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/1752-51-0x0000000000400000-0x000000000041C000-memory.dmp

    Filesize

    112KB

  • memory/3928-28-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/3928-20-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB