Analysis
-
max time kernel
96s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 11:29
Static task
static1
Behavioral task
behavioral1
Sample
537f73062623a661163152ce61c683406790fe1b2a95e3fe9adf91ee2004e504N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
537f73062623a661163152ce61c683406790fe1b2a95e3fe9adf91ee2004e504N.dll
Resource
win10v2004-20240802-en
General
-
Target
537f73062623a661163152ce61c683406790fe1b2a95e3fe9adf91ee2004e504N.dll
-
Size
8KB
-
MD5
13db19795676155fdcbce7771c3ff8c0
-
SHA1
a693d78a132399d924764eec2515693e8e22e998
-
SHA256
537f73062623a661163152ce61c683406790fe1b2a95e3fe9adf91ee2004e504
-
SHA512
d29192f485ad4b39ebae5a891ac7b399a6cca8da71a0d25e8720e39e40825d7330055e9fb5dd65ad20a390087fae5f2ff53d07284e5440f1d7d9060ba49c65c2
-
SSDEEP
192:Wh4SFyvWohE5xf6YUBSL63SUJqtMblWN:WO+ohE2B13NJqtM
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ctfmen = "C:\\Windows\\system32\\ctfmen.exe" rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\satornas.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\satornas.dll rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1100 wrote to memory of 4432 1100 rundll32.exe 82 PID 1100 wrote to memory of 4432 1100 rundll32.exe 82 PID 1100 wrote to memory of 4432 1100 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\537f73062623a661163152ce61c683406790fe1b2a95e3fe9adf91ee2004e504N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\537f73062623a661163152ce61c683406790fe1b2a95e3fe9adf91ee2004e504N.dll,#12⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4432
-