Analysis

  • max time kernel
    116s
  • max time network
    174s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-10-2022 22:36

General

  • Target

    Catelog.jpg.exe

  • Size

    123KB

  • MD5

    458a2379358ae7cdd5a47059277338ca

  • SHA1

    c3753cfa681d226b772a3ab6bc462a5c29791fa0

  • SHA256

    d954de23f8e04cff445b91436fdaf60b05c18e115c3dda8afce8460d72fb1fa7

  • SHA512

    fe182750f864b963f5ca970013bf5003dd108c7e7d69c981d9b8779b8276727b464fd5a1978dffd68e9e52e809bf7ce23206114d58f6aba3d87d4e8b5d768705

  • SSDEEP

    3072:wJQ8sYDCBvQTYMGWdQUkv2Gc1eGktXENiTRWnTuX8Wr:yERqTfGDHv+DvoTROTu

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Catelog.jpg.exe
    "C:\Users\Admin\AppData\Local\Temp\Catelog.jpg.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5004
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "XGdES9N8RW" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\dGNIWZiH\seb2plM.exe.lnk"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2676
      • C:\Windows\SysWOW64\reg.exe
        reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "XGdES9N8RW" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\dGNIWZiH\seb2plM.exe.lnk"
        3⤵
        • Adds Run key to start application
        PID:3444
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe"
      2⤵
      • Drops startup file
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1184
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe"
        3⤵
        • Executes dropped EXE
        PID:116

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe

    Filesize

    34KB

    MD5

    e118330b4629b12368d91b9df6488be0

    SHA1

    ce90218c7e3b90df2a3409ec253048bb6472c2fd

    SHA256

    3a0f2936b8c45e8ba3458d69d7859a63844469e698652e15fb56639d32f40cc9

    SHA512

    ac91c04cb20223dbaaf594440cb778dff36e857921be427c8528ba4c6cdb3e8bf8e71e1ae8af7bde9c04ff5b97b379231625bc1a2b66aba2f98cd340cd8a94b0

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\lsass.exe

    Filesize

    34KB

    MD5

    e118330b4629b12368d91b9df6488be0

    SHA1

    ce90218c7e3b90df2a3409ec253048bb6472c2fd

    SHA256

    3a0f2936b8c45e8ba3458d69d7859a63844469e698652e15fb56639d32f40cc9

    SHA512

    ac91c04cb20223dbaaf594440cb778dff36e857921be427c8528ba4c6cdb3e8bf8e71e1ae8af7bde9c04ff5b97b379231625bc1a2b66aba2f98cd340cd8a94b0

  • memory/116-139-0x0000000000000000-mapping.dmp

  • memory/1184-136-0x0000000000000000-mapping.dmp

  • memory/1184-137-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/1184-141-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/2676-134-0x0000000000000000-mapping.dmp

  • memory/3444-135-0x0000000000000000-mapping.dmp

  • memory/5004-132-0x0000000074B10000-0x00000000750C1000-memory.dmp

    Filesize

    5.7MB

  • memory/5004-133-0x0000000074B10000-0x00000000750C1000-memory.dmp

    Filesize

    5.7MB

  • memory/5004-138-0x0000000074B10000-0x00000000750C1000-memory.dmp

    Filesize

    5.7MB