Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 20:11
Static task
static1
Behavioral task
behavioral1
Sample
34b6dd8484e6e896a748cd5f9dadf187425e617ff1bb9abb2b2c4fcc9736c12eN.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
34b6dd8484e6e896a748cd5f9dadf187425e617ff1bb9abb2b2c4fcc9736c12eN.dll
Resource
win10v2004-20240802-en
General
-
Target
34b6dd8484e6e896a748cd5f9dadf187425e617ff1bb9abb2b2c4fcc9736c12eN.dll
-
Size
8KB
-
MD5
fe043459e3d532060a1bd4a46e35e380
-
SHA1
92ce249785a0a13214b8c047bf6520a65678011c
-
SHA256
34b6dd8484e6e896a748cd5f9dadf187425e617ff1bb9abb2b2c4fcc9736c12e
-
SHA512
09c21414d28121dee2e1ebcfe86bab88c531c45b937c16f8b21f35fe4fda1b6dd9d8409d372ea5fbfe19175ea64fa40c652258c0fe78e9ea6646ef0eba885d15
-
SSDEEP
192:M8h4SFyvWohE5xf6YUBSL63SUJqtMblWN:vO+ohE2B13NJqtM
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ctfmen = "C:\\Windows\\system32\\ctfmen.exe" rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\satornas.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\satornas.dll rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5096 wrote to memory of 388 5096 rundll32.exe 82 PID 5096 wrote to memory of 388 5096 rundll32.exe 82 PID 5096 wrote to memory of 388 5096 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\34b6dd8484e6e896a748cd5f9dadf187425e617ff1bb9abb2b2c4fcc9736c12eN.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\34b6dd8484e6e896a748cd5f9dadf187425e617ff1bb9abb2b2c4fcc9736c12eN.dll,#12⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:388
-