Analysis
-
max time kernel
77s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01-10-2022 22:36
Static task
static1
Behavioral task
behavioral1
Sample
Catelog.jpg.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Catelog.jpg.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Samples.jpg.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
Samples.jpg.exe
Resource
win10v2004-20220812-en
General
-
Target
Catelog.jpg.exe
-
Size
123KB
-
MD5
458a2379358ae7cdd5a47059277338ca
-
SHA1
c3753cfa681d226b772a3ab6bc462a5c29791fa0
-
SHA256
d954de23f8e04cff445b91436fdaf60b05c18e115c3dda8afce8460d72fb1fa7
-
SHA512
fe182750f864b963f5ca970013bf5003dd108c7e7d69c981d9b8779b8276727b464fd5a1978dffd68e9e52e809bf7ce23206114d58f6aba3d87d4e8b5d768705
-
SSDEEP
3072:wJQ8sYDCBvQTYMGWdQUkv2Gc1eGktXENiTRWnTuX8Wr:yERqTfGDHv+DvoTROTu
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1172 lsass.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe cvtres.exe -
Loads dropped DLL 2 IoCs
pid Process 288 Catelog.jpg.exe 928 cvtres.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\XGdES9N8RW = "C:\\Users\\Admin\\AppData\\Roaming\\dGNIWZiH\\seb2plM.exe.lnk" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 288 set thread context of 928 288 Catelog.jpg.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 288 Catelog.jpg.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 288 Catelog.jpg.exe Token: SeDebugPrivilege 928 cvtres.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 288 wrote to memory of 1244 288 Catelog.jpg.exe 27 PID 288 wrote to memory of 1244 288 Catelog.jpg.exe 27 PID 288 wrote to memory of 1244 288 Catelog.jpg.exe 27 PID 288 wrote to memory of 1244 288 Catelog.jpg.exe 27 PID 1244 wrote to memory of 2020 1244 cmd.exe 29 PID 1244 wrote to memory of 2020 1244 cmd.exe 29 PID 1244 wrote to memory of 2020 1244 cmd.exe 29 PID 1244 wrote to memory of 2020 1244 cmd.exe 29 PID 288 wrote to memory of 928 288 Catelog.jpg.exe 30 PID 288 wrote to memory of 928 288 Catelog.jpg.exe 30 PID 288 wrote to memory of 928 288 Catelog.jpg.exe 30 PID 288 wrote to memory of 928 288 Catelog.jpg.exe 30 PID 288 wrote to memory of 928 288 Catelog.jpg.exe 30 PID 288 wrote to memory of 928 288 Catelog.jpg.exe 30 PID 288 wrote to memory of 928 288 Catelog.jpg.exe 30 PID 928 wrote to memory of 1172 928 cvtres.exe 31 PID 928 wrote to memory of 1172 928 cvtres.exe 31 PID 928 wrote to memory of 1172 928 cvtres.exe 31 PID 928 wrote to memory of 1172 928 cvtres.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Catelog.jpg.exe"C:\Users\Admin\AppData\Local\Temp\Catelog.jpg.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:288 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "XGdES9N8RW" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\dGNIWZiH\seb2plM.exe.lnk"2⤵
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "XGdES9N8RW" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\dGNIWZiH\seb2plM.exe.lnk"3⤵
- Adds Run key to start application
PID:2020
-
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe"2⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe"3⤵
- Executes dropped EXE
PID:1172
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5ed797d8dc2c92401985d162e42ffa450
SHA10f02fc517c7facc4baefde4fe9467fb6488ebabe
SHA256b746362010a101cb5931bc066f0f4d3fc740c02a68c1f37fc3c8e6c87fd7cb1e
SHA512e831a6ff987f3ef29982da16afad06938b68eddd43c234ba88d1c96a1b5547f2284baf35cbb3a5bfd75e7f0445d14daa014e0ba00b4db72c67f83f0a314c80c2
-
Filesize
31KB
MD5ed797d8dc2c92401985d162e42ffa450
SHA10f02fc517c7facc4baefde4fe9467fb6488ebabe
SHA256b746362010a101cb5931bc066f0f4d3fc740c02a68c1f37fc3c8e6c87fd7cb1e
SHA512e831a6ff987f3ef29982da16afad06938b68eddd43c234ba88d1c96a1b5547f2284baf35cbb3a5bfd75e7f0445d14daa014e0ba00b4db72c67f83f0a314c80c2
-
Filesize
123KB
MD5458a2379358ae7cdd5a47059277338ca
SHA1c3753cfa681d226b772a3ab6bc462a5c29791fa0
SHA256d954de23f8e04cff445b91436fdaf60b05c18e115c3dda8afce8460d72fb1fa7
SHA512fe182750f864b963f5ca970013bf5003dd108c7e7d69c981d9b8779b8276727b464fd5a1978dffd68e9e52e809bf7ce23206114d58f6aba3d87d4e8b5d768705