Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14/10/2024, 15:54

General

  • Target

    6362501b72a737e729442ba94d3039289bb720f67739f797ea9bb252fb5836efN.exe

  • Size

    119KB

  • MD5

    1a91c0ffd3c0bd7875ca1e737f51f070

  • SHA1

    ff62e4253f64bdad802cdb5a6f16f32f94daab48

  • SHA256

    6362501b72a737e729442ba94d3039289bb720f67739f797ea9bb252fb5836ef

  • SHA512

    a38865b3acfa08333026df13e461bf481eea925507183ff09ecf168c0bef8932e45ec8c318c8948a7211fdbada8282399132a343ca4176fb912bb6a29034bf61

  • SSDEEP

    3072:+OjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPh:+Is9OKofHfHTXQLzgvnzHPowYbvrjD/E

Malware Config

Signatures

  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6362501b72a737e729442ba94d3039289bb720f67739f797ea9bb252fb5836efN.exe
    "C:\Users\Admin\AppData\Local\Temp\6362501b72a737e729442ba94d3039289bb720f67739f797ea9bb252fb5836efN.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2704
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2812
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2724
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 840
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:1012

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\satornas.dll

          Filesize

          183B

          MD5

          0b2d15cac2abc4fdc7dd543313397fb6

          SHA1

          32aac72f3f8c2f9b95e1ae1318ec9c91ee545009

          SHA256

          105e9ade156a1a50d54728221e2d5d8d500dd0466e79c51a8a9c94e82220288b

          SHA512

          503ff5924cfd0a1989696adba693be48ab0b46a2c7d5a63179f1086af141ff9a1df903b6c1a3a85c193ab999d3b7c5f1f9bd34ddf408c2d4934cf1040cbf7753

        • \Windows\SysWOW64\ctfmen.exe

          Filesize

          4KB

          MD5

          eb51ad626c99b70633bbdee7c8eda865

          SHA1

          08a6b6ba657bb9223ddad7b05d8fa8f2d4ca4d2c

          SHA256

          5f2fa43361297c7cc31c073be1bbc15434c676d43cb1e3c7ba6fc1919bcdf005

          SHA512

          f0505c37c07e2e771d4e7bcf6bd951342ac4fb25b2748dbd676c9df18598dd8ab8c858ece40fdf995c508c225a3ae4cfe4a24105312f9737141d6eda9059b9a2

        • \Windows\SysWOW64\shervans.dll

          Filesize

          8KB

          MD5

          797f57580854b8e75501ea47b8ca46bc

          SHA1

          6b0f11217cb201a5998df04ec50995d1cc2e1861

          SHA256

          9378d1c2792f31414ef052734487fe5443965ea4b1e74f0973dca991998d861b

          SHA512

          6256725e6c2b3aa5607cf0876186b75e0b906c7f6cd3a40bddcd800c9933763abb0dafe2f38ffc8b6d3c8751dbb0462b3d0b40f24e1bea02b8d6801cefe31a36

        • \Windows\SysWOW64\smnss.exe

          Filesize

          119KB

          MD5

          12775126223811b46faeb5892a174253

          SHA1

          32bf5c185f4dea6e83bb9c0f82d0a186b5d0be9b

          SHA256

          556d83bb325a73d190fa1913577f75a82b854c39a284dc04e7e8b371fccc93bb

          SHA512

          3a9c0777813b0f75e973897a3777ecf3d46265948f1702ced2fd323df9a74a682e6672eb462ea69a065b1460311322e524f6dd6931ec47031d847d900a4863b2

        • memory/2704-24-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2704-25-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB

        • memory/2704-0-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2704-12-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB

        • memory/2724-40-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB

        • memory/2724-45-0x0000000010000000-0x000000001000D000-memory.dmp

          Filesize

          52KB

        • memory/2724-46-0x0000000000400000-0x0000000000420000-memory.dmp

          Filesize

          128KB

        • memory/2812-27-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB

        • memory/2812-29-0x00000000002B0000-0x00000000002D0000-memory.dmp

          Filesize

          128KB

        • memory/2812-34-0x0000000000400000-0x0000000000409000-memory.dmp

          Filesize

          36KB