Analysis
-
max time kernel
115s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-10-2024 05:08
Static task
static1
Behavioral task
behavioral1
Sample
9651c75619fa42c95d1d0b3685c185a109e304c601f4701150bcd848fd16faf2N.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9651c75619fa42c95d1d0b3685c185a109e304c601f4701150bcd848fd16faf2N.dll
Resource
win10v2004-20240802-en
General
-
Target
9651c75619fa42c95d1d0b3685c185a109e304c601f4701150bcd848fd16faf2N.dll
-
Size
8KB
-
MD5
68d359856cd4587bdce3f27b5e1ba6d0
-
SHA1
7bc823dc29f15e4c5072326ea60627507a59aa87
-
SHA256
9651c75619fa42c95d1d0b3685c185a109e304c601f4701150bcd848fd16faf2
-
SHA512
ae88175c81a70c238337b0ec881fa17564d055ef497f7d96bee6cf56c2fb8b2be8dd3063796be80b29cf36d4860d1053758415d3a5c4d9e8f10b6b9c3e831717
-
SSDEEP
192:Jh4SFyvWohE5xf6YUBSL63SUJqtMblWN:JO+ohE2B13NJqtM
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ctfmen = "C:\\Windows\\system32\\ctfmen.exe" rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\satornas.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\satornas.dll rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4608 wrote to memory of 3104 4608 rundll32.exe 91 PID 4608 wrote to memory of 3104 4608 rundll32.exe 91 PID 4608 wrote to memory of 3104 4608 rundll32.exe 91
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9651c75619fa42c95d1d0b3685c185a109e304c601f4701150bcd848fd16faf2N.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9651c75619fa42c95d1d0b3685c185a109e304c601f4701150bcd848fd16faf2N.dll,#12⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4120,i,1729213506309163284,12809566808978835441,262144 --variations-seed-version --mojo-platform-channel-handle=4440 /prefetch:81⤵PID:5004