Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    08-10-2024 22:05

General

  • Target

    5d7222d1cc8d61838885496ab9b86da43acdcd05c67ccdaa7025d2e65ca2781d.exe

  • Size

    118KB

  • MD5

    6140b34f70a0a3112cecb8cd324a64d7

  • SHA1

    878dfbee59810a8d43b9c45196beb7cf0ec24f13

  • SHA256

    5d7222d1cc8d61838885496ab9b86da43acdcd05c67ccdaa7025d2e65ca2781d

  • SHA512

    603c2b82f2450f63eeb4f5725dbb53c5e111a0860e9a62adbc23ee8867fead9ec3bc14a9128deaeaee47ddd676eea834915328bff3f1abea3d0987a61358a524

  • SSDEEP

    3072:QOjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPo:QIs9OKofHfHTXQLzgvnzHPowYbvrjD/h

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5d7222d1cc8d61838885496ab9b86da43acdcd05c67ccdaa7025d2e65ca2781d.exe
    "C:\Users\Admin\AppData\Local\Temp\5d7222d1cc8d61838885496ab9b86da43acdcd05c67ccdaa7025d2e65ca2781d.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2644
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1080
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2708
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2708 -s 820
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2608

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    bf976de6e4d9cfe161b2ac0c6c91ec5e

    SHA1

    289c503f716ad20ff18119ff05b255b60ad34d77

    SHA256

    bdda81825429a8ac31611d5f6727fc6a963d1224a379a4bcc0032cb6700b5467

    SHA512

    6005b850bd9451b418ddbd3a5daee3d0cb7c76d43f91787846ca5cdad92ba1847682d2596de41dc89e86db97bdb4bacc9557d2f8fbf4e40a526663ed3c84ecc7

  • \Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    82b064cfc89e7d89625e122a7d7460bd

    SHA1

    2d32f8a8db635e63534d292f01f7bc81afb13ea7

    SHA256

    03cde8963c8b38655063e1868937ed1f8c5fb2fd3539629629cf424d746665bf

    SHA512

    db5356f9708ad924f0596fd9194b2a29b29718b6c589c12c2a5942b5fb70765dd8a665e0ce7894f6e4fc349061fb089dc47dac7cefa5908e94b5599e232957cd

  • \Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    1b31b1674ba4c5975e23f6cc17cc632f

    SHA1

    d3dc405b71c223c10cb9f54641fa4d7bc8e55d2b

    SHA256

    12cd016cb6212e6d39fe61e4d5eefee53e646546a1561647a2c861491d033614

    SHA512

    b33b4abab97308461460e83a48d3b718cb7675c10483b461d8a81155713052442150beda94968654ce3f840ab053ff4a5f963b0a0b913be77457aedbd1dc5c52

  • \Windows\SysWOW64\smnss.exe

    Filesize

    118KB

    MD5

    3d89c0d49d3a6077b49acde3f4701904

    SHA1

    6f8d93590116c9379a69a6d7823fc1bc19d75a00

    SHA256

    c7bfb0ab3c8562e7d11b71bbcb1a8759e167f094baf39b6e8921545099a43ed4

    SHA512

    6230ba74c6a6c6710bbbcfcb42412ee24b9b612b0bf06e8013c85e55050c0e9708ea5d00b2ce4aabe0581297b3f132a1d82cd84bb2912eba708cc8b2550f9ed4

  • memory/1080-27-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/1080-30-0x00000000002B0000-0x00000000002CF000-memory.dmp

    Filesize

    124KB

  • memory/2644-28-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2644-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2644-26-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB

  • memory/2644-18-0x0000000000340000-0x0000000000349000-memory.dmp

    Filesize

    36KB

  • memory/2644-12-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2708-40-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2708-45-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/2708-46-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB