Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-10-2024 03:10

General

  • Target

    ce59d5f6ebd7f3bf8fb1c1e5ca48b295812510071b26b5a8cd5367e910332e79.exe

  • Size

    119KB

  • MD5

    3b2f08bc789e781ee3d8fe7a0ae08ac2

  • SHA1

    94553170748da35a663b501b7852cfc9ef525160

  • SHA256

    ce59d5f6ebd7f3bf8fb1c1e5ca48b295812510071b26b5a8cd5367e910332e79

  • SHA512

    f3b60537555b74a7719c6e6a742e9d1585e0c93620be88e2b5ca24476284b41f54919670df64b6ee1d002092b0c3699890f496187b5e713f9262009046ce8990

  • SSDEEP

    3072:mOjWuyt0ZsqsXOKofHfHTXQLzgvnzHPowYbvrjD/L7QPbg/Dr0T3rnXLHf7zjPPh:mIs9OKofHfHTXQLzgvnzHPowYbvrjD/E

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • ACProtect 1.3x - 1.4x DLL software 1 IoCs

    Detects file using ACProtect software.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 19 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce59d5f6ebd7f3bf8fb1c1e5ca48b295812510071b26b5a8cd5367e910332e79.exe
    "C:\Users\Admin\AppData\Local\Temp\ce59d5f6ebd7f3bf8fb1c1e5ca48b295812510071b26b5a8cd5367e910332e79.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1616
    • C:\Windows\SysWOW64\ctfmen.exe
      ctfmen.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4728
      • C:\Windows\SysWOW64\smnss.exe
        C:\Windows\system32\smnss.exe
        3⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Enumerates connected drives
        • Maps connected drives based on registry
        • Drops file in System32 directory
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        PID:536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\ctfmen.exe

    Filesize

    4KB

    MD5

    6fba0fe1e70810127dc99990291f2f5f

    SHA1

    f1c9929c20681a9f7f9b1c748c93516caa0cddf8

    SHA256

    dc7f1b614491024ec52337a943927d354feee2d9641e28dbb25b7a324dc34408

    SHA512

    4169d7a0767654838541707292eca100ff78bfd291887b7de0efff0d8ede100a290eea402bcae070c9525b0f4285aa7c68f9a8563deafa8042b228d5671def10

  • C:\Windows\SysWOW64\grcopy.dll

    Filesize

    119KB

    MD5

    dddae1e49d1cac9d02d4dd48acab8801

    SHA1

    1dc40db33d47dd0ebb22b2ca3eda8c277c9610a2

    SHA256

    9b2405a43657e12af51cbe34badbc09e90c452fceefd0fe2ac632ff82a09a766

    SHA512

    be350ace30aa57a2f41554dbbea4c945aaf6564affe124d9d75fd1731f98f65f8c9033c959c73bf385507b8d80699d6476066ae9ce4d2378ed4d50596e00e49c

  • C:\Windows\SysWOW64\satornas.dll

    Filesize

    183B

    MD5

    40068c25e8289f08f370ccfeb31da9cb

    SHA1

    8e584895b58ccc5f98e29568f30cc7b72e1e3b2d

    SHA256

    78ff0dac5261cb7922a50030af97944de396d05921a874908f08e00ae15f6fca

    SHA512

    21ce0d08dde8b154dbe8ebb5ac05f27546e61abc75ab9af7cdb1b70935cab5b7f125bc7f311da5ad0615393ee53bc94c6d45fdd9300403a4b9d1bff0a8eac86e

  • C:\Windows\SysWOW64\shervans.dll

    Filesize

    8KB

    MD5

    ebd5dc8b14fbd355c75da26bdb84e52c

    SHA1

    ed53d8473ed7926971ea80d94ab1a39a9f465845

    SHA256

    e2656eb8c30f7d13c76b05315693860ac115adb621d07a63e2baab2e516583f6

    SHA512

    637c1db962592eed8251c71da089f07747584f789d15306d86904333be3a34c2f4e50762aede684db010bf7f248b5752db7533cac74bd36c11b8dfe634a5b049

  • memory/536-30-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/536-40-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/536-39-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/536-37-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/1616-23-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/1616-0-0x0000000000400000-0x0000000000420000-memory.dmp

    Filesize

    128KB

  • memory/1616-24-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/1616-12-0x0000000010000000-0x000000001000D000-memory.dmp

    Filesize

    52KB

  • memory/4728-28-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/4728-21-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB