Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/09/2024, 03:41

General

  • Target

    df7fdcd2f51e912ba1809f5a510b5caffdfa5eae4a856ecc439fec826649ef79.exe

  • Size

    2.3MB

  • MD5

    89700a493e3d5a783f11d8e7cff62701

  • SHA1

    f2d2bd9dffeccbdc6b7e5f0610f7a68cfd22ed03

  • SHA256

    df7fdcd2f51e912ba1809f5a510b5caffdfa5eae4a856ecc439fec826649ef79

  • SHA512

    9aaf677a229d4ca01eb4360f647e8b52e3bc5d7829605f129c8cf2c5b0446c88667c2291df7df72a39d5e6dc01a327bf2de59c66ab1fb37067b4c3d72e81ebd1

  • SSDEEP

    49152:ojvk2d9rJpNJ6jUFdXaDoIHmXMupzh72lxakn2YpHdy4ZBgIoooNe:orkI9rSjA5aDo73pzF2bz3p9y4HgIoov

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df7fdcd2f51e912ba1809f5a510b5caffdfa5eae4a856ecc439fec826649ef79.exe
    "C:\Users\Admin\AppData\Local\Temp\df7fdcd2f51e912ba1809f5a510b5caffdfa5eae4a856ecc439fec826649ef79.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4680
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:512
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2260

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    ecd6d99d3dcc13fd012cf2368fdd20ec

    SHA1

    854e2e7454835831c4cffe32381e15f205ce80a6

    SHA256

    25894694f06b6265bcd451ad272bd4c5d4887e5be8ac623680114a2c13a2e053

    SHA512

    baeae33e8fcc1f89dd06b200896ac62f808ba6b8de228bdb4895108e7feb6c53c1ce70c63fa136501e09f9b492a2faebc5910a346dcfc3e25dcbcdd7e641c0e1

  • C:\Windows\SysWOW64\grcopy.dll

    Filesize

    2.3MB

    MD5

    e12f5b82eeac043af3c741b599430603

    SHA1

    64d3639b6435c4e10d69046ecc4b92e579801793

    SHA256

    8ed12e762c8144becc275b0ff7a75ef420be803cb14d9142804fc34188040182

    SHA512

    bd471c23cfdaa18d45845dde74344459763746e64fdac6729a56c687e0e4734d0ce5230cd909eb7cdc4348a456ba3eff77a44009fd1807c93558cfa93b1684dc

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    53ac110c9f35a7db09547c6b2a35e3de

    SHA1

    fbfbc1e83fb27d262879649d664ce09b4223c338

    SHA256

    0f8fe02b58849d9ffe31c61c8e65bf610ee0a3274a789c67687658435e404ec4

    SHA512

    c0a933abaabbc435c46ee9278d0f9d816896bd623b68afb0133b5f97ea032822229ee7ea4136b4146a0353e50b5a50f3b093064626a5cd0a8688ef891b7f97c3

  • C:\Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    c7e11671e02162299dfc182c0c6cd74f

    SHA1

    747e944e8f3c64a115009b6865f06b6a47c386a2

    SHA256

    8d1a0d69a49f66828b71e03e1d4b2ade38ae56d51e80f01226640da214e69c30

    SHA512

    da7d906f310d6347377b15acf28c33e440f28d7fc7fca63c0c47aae6d9b282a42b93a1602fb8b518c58b066c5890a418602070976066524308486ed53dc023a7

  • memory/512-22-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/512-33-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2260-43-0x000000007FA70000-0x000000007FE41000-memory.dmp

    Filesize

    3.8MB

  • memory/2260-46-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2260-70-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2260-31-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2260-68-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2260-66-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2260-34-0x000000007FA70000-0x000000007FE41000-memory.dmp

    Filesize

    3.8MB

  • memory/2260-40-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2260-64-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2260-42-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2260-62-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2260-45-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2260-44-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2260-60-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2260-48-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2260-50-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2260-52-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2260-54-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2260-56-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/2260-58-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/4680-30-0x000000007FA70000-0x000000007FE41000-memory.dmp

    Filesize

    3.8MB

  • memory/4680-0-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/4680-1-0x000000007FA70000-0x000000007FE41000-memory.dmp

    Filesize

    3.8MB

  • memory/4680-25-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/4680-29-0x0000000000400000-0x0000000000DCE000-memory.dmp

    Filesize

    9.8MB

  • memory/4680-14-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB