Analysis

  • max time kernel
    93s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2024, 03:59

General

  • Target

    db2afe0232f9d31fa7195e009deaecf1d17661ed5132b959e25bc433d70a11ac.exe

  • Size

    152KB

  • MD5

    7b01314c8e4706e0fa1c2a7e2e70af53

  • SHA1

    a5b9b5fec2da5154ad88e61dc41b1bb9fd4a5de5

  • SHA256

    db2afe0232f9d31fa7195e009deaecf1d17661ed5132b959e25bc433d70a11ac

  • SHA512

    5d7e030dcffa474625512dfe9b36dff7cd6345d1c26e7dbae3328f31508a962428e4c53fcb5eb74b8fe89978d603b7766188b170e0860f79a4162e8bbaf35b95

  • SSDEEP

    3072:uOjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPt:uIs9OKofHfHTXQLzgvnzHPowYbvrjD/6

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\db2afe0232f9d31fa7195e009deaecf1d17661ed5132b959e25bc433d70a11ac.exe
    "C:\Users\Admin\AppData\Local\Temp\db2afe0232f9d31fa7195e009deaecf1d17661ed5132b959e25bc433d70a11ac.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4740
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:216
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:4120
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4120 -s 1392
          4⤵
          • Program crash
          PID:4084
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4120 -ip 4120
    1⤵
      PID:968

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\ctfmen.exe

            Filesize

            4KB

            MD5

            5f99edbe676450be51b9a1a518e01728

            SHA1

            6eb68ba733d643fdc472214ec81ab4adedaf2615

            SHA256

            d2045ec86fe463c1ec0ec764837625f4dd27c438d251cee594b73e1f99d9838b

            SHA512

            c6692ae183a15ef9d866dabf49dcd2abbc57325ef283c4944d2c548732b37f6122541071f96c3fcb1379f940cf353acca35e75ed2fd882e2a45b68757b0832c1

          • C:\Windows\SysWOW64\grcopy.dll

            Filesize

            152KB

            MD5

            b123467a3bb3e0e4cce1d51672375b2b

            SHA1

            58cb6610543302cf452eba78bdd64420c11e5305

            SHA256

            5852a6d87986e42926569e21efb2f513250446d43b1e171cc7938f6638e7b579

            SHA512

            4627d516dc886e60f37c39e9377a1db3f23a42861c3e62a0cc58887a27fbf831e12646bd20ebc391aa9098cc3144b94f8a467be01e1ae79434324314c89ae6a2

          • C:\Windows\SysWOW64\satornas.dll

            Filesize

            183B

            MD5

            94295156e74e5cf1521e1710710078e8

            SHA1

            0383acefe82ac0a4da0bd880f62b6383238bb2c8

            SHA256

            8471ce28f78176e688a0653418138ed7b447bc3d78bb15fcb052f7ee5c931dfe

            SHA512

            63cb83005dbee2253c5903aeb7334993791a414467e1e83b9b563078ab4c0ba085093e046de2e889e3a32a5720745ab9996b8761bc49a867e4d16c1c67ddd704

          • C:\Windows\SysWOW64\shervans.dll

            Filesize

            8KB

            MD5

            0b95e2f5f0628191d5baa58fec951785

            SHA1

            555340dc64cf48d81f746bb72ae2389942806a2d

            SHA256

            064f913817a441461a3ed37716bb585f253fda6ceaf72d84f10ddf9d89497912

            SHA512

            0946ac87c6d49811583d94dcb2db04279ac039a8c0a999c699a95364c51a237613453ef06f0d76ff2bb4347c70a9ac081096d16da7adf2f97be5871948fe33a6

          • memory/216-22-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/216-28-0x0000000000400000-0x0000000000409000-memory.dmp

            Filesize

            36KB

          • memory/4120-30-0x0000000000400000-0x0000000000420000-memory.dmp

            Filesize

            128KB

          • memory/4120-37-0x0000000010000000-0x000000001000D000-memory.dmp

            Filesize

            52KB

          • memory/4120-39-0x0000000010000000-0x000000001000D000-memory.dmp

            Filesize

            52KB

          • memory/4120-40-0x0000000000400000-0x0000000000420000-memory.dmp

            Filesize

            128KB

          • memory/4740-13-0x0000000010000000-0x000000001000D000-memory.dmp

            Filesize

            52KB

          • memory/4740-0-0x0000000000400000-0x0000000000420000-memory.dmp

            Filesize

            128KB

          • memory/4740-25-0x0000000010000000-0x000000001000D000-memory.dmp

            Filesize

            52KB

          • memory/4740-24-0x0000000000400000-0x0000000000420000-memory.dmp

            Filesize

            128KB