Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2024 05:52

General

  • Target

    199af6fabe177c520bc0426eecd9dff4d4d5b8a4b8b53bbacc0aee6b6f31467dN.exe

  • Size

    119KB

  • MD5

    74153712f95974ac55e19073f1707190

  • SHA1

    62c0a4b762bff17eda8785c7502e7d5a622b900e

  • SHA256

    199af6fabe177c520bc0426eecd9dff4d4d5b8a4b8b53bbacc0aee6b6f31467d

  • SHA512

    b5cdf5fa9fc9ae8419e1d110538d5f37cdba8bf8a4d61a5fd9737cdf44c57ad00215c69a474ca1061681fe6ffe5e85145c14037b2f17a86c76982ab057454d5a

  • SSDEEP

    3072:yOjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPh:yIs9OKofHfHTXQLzgvnzHPowYbvrjD/E

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\199af6fabe177c520bc0426eecd9dff4d4d5b8a4b8b53bbacc0aee6b6f31467dN.exe
    "C:\Users\Admin\AppData\Local\Temp\199af6fabe177c520bc0426eecd9dff4d4d5b8a4b8b53bbacc0aee6b6f31467dN.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1500
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3064
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:3176

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    61db5fe6773cfad658aebddbf496a0ef

    SHA1

    fdfee717ca3a7e9b2895bddd3c403b53787343d5

    SHA256

    b05178fb1b214bb0fe2989b3ae2b11a8a4ba94d9c62f9e5af19d8725995d6261

    SHA512

    ee523fedcae7c2fab853b3d1fdecb1039077a33b82d42fd252235a6fa334ebe0fb03ee2c788880fcc1fc653f793be63d54a52f3fe9cae451a638a8f6c52695c3

  • C:\Windows\SysWOW64\grcopy.dll

    Filesize

    119KB

    MD5

    6bd03ba5cb6df0d06a36ab3a59015fb0

    SHA1

    24eb0dd95c509a6abe36bd202c317526e9d51b92

    SHA256

    c8b6f82d40e09c05113e44b78332e335b591a08d5fee918eee1f763972e7cd77

    SHA512

    2213fe0b036b4c7e1e3b088d4f9d77ea9db318fdde94b1d2f8884a19e8e47482409b27ef4fd195919547fc01fca0031eb4057bf71c8ddcf921cd3e664cbf02d6

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    f55c9ede0fed1e062c64c67a37b81fbb

    SHA1

    f935e5109e40bf7b2b47588d2a6fc36ba7159b37

    SHA256

    a404bcc19e9eb59bd8c61f0dc60d8ef80cb56ba42fe7d735ca747777dd52cb54

    SHA512

    85fc7316515ee80e6a6636e406782c6eaffa4f7785d64aee111e0047ff2cf7560f9d26e77cf756105f0b243aa7eece65f4353aa9425806a134a6135cfb80ad3b

  • C:\Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    f7e608870b061694b65e79b2643c4588

    SHA1

    30654a416f828389578395d6980462f942fbee68

    SHA256

    385cc1dba861c434c003068f4c11ca9f1ec8a3ec53dde953a77101323b0a0b51

    SHA512

    9efeb90ff6926625d845524d88a2724e0947c97a929c18bdaf23a99c418150aa3300cb6d882aa2ff6e55953d731b8539e70c769d52d17a3cba0e54eeec695323

  • memory/1500-24-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/1500-0-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/1500-23-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/1500-12-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/3064-21-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/3064-29-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/3176-30-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/3176-38-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/3176-39-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB