Analysis
-
max time kernel
148s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 15:12
Static task
static1
Behavioral task
behavioral1
Sample
3fdcdf440ee96f3b858f78b30a7f3344b679f1b333cfe5643d3a22cf6491a153.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3fdcdf440ee96f3b858f78b30a7f3344b679f1b333cfe5643d3a22cf6491a153.exe
Resource
win10v2004-20220812-en
General
-
Target
3fdcdf440ee96f3b858f78b30a7f3344b679f1b333cfe5643d3a22cf6491a153.exe
-
Size
932KB
-
MD5
917917c7e74d4fadb834492c30981b30
-
SHA1
d8888eb5b5354d06ea398e74d38cadac0c6a50d0
-
SHA256
3fdcdf440ee96f3b858f78b30a7f3344b679f1b333cfe5643d3a22cf6491a153
-
SHA512
55ee337f10e4e6f2243b70c3875364c4e9b314905eb103be1efe03fe87e4c7475deb4b30c174c827356d7b962ff6301a0ac4bb32d91e7189614a3c6cd893df2e
-
SSDEEP
12288:71/aGLDCMNpNAkoSzZWD8ayX2MQCw7D0FoWxJpcEi0/3IWV//7cSdmwPW5Qjp0Zt:71/aGLDCM4D8ayGMZo8/Cf5Qj+k/tur
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 940 catpmi.exe -
Loads dropped DLL 2 IoCs
pid Process 1592 3fdcdf440ee96f3b858f78b30a7f3344b679f1b333cfe5643d3a22cf6491a153.exe 1592 3fdcdf440ee96f3b858f78b30a7f3344b679f1b333cfe5643d3a22cf6491a153.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft® Windows® Operating System = "C:\\ProgramData\\catpmi.exe" catpmi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1592 wrote to memory of 940 1592 3fdcdf440ee96f3b858f78b30a7f3344b679f1b333cfe5643d3a22cf6491a153.exe 27 PID 1592 wrote to memory of 940 1592 3fdcdf440ee96f3b858f78b30a7f3344b679f1b333cfe5643d3a22cf6491a153.exe 27 PID 1592 wrote to memory of 940 1592 3fdcdf440ee96f3b858f78b30a7f3344b679f1b333cfe5643d3a22cf6491a153.exe 27 PID 1592 wrote to memory of 940 1592 3fdcdf440ee96f3b858f78b30a7f3344b679f1b333cfe5643d3a22cf6491a153.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\3fdcdf440ee96f3b858f78b30a7f3344b679f1b333cfe5643d3a22cf6491a153.exe"C:\Users\Admin\AppData\Local\Temp\3fdcdf440ee96f3b858f78b30a7f3344b679f1b333cfe5643d3a22cf6491a153.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\ProgramData\catpmi.exe"C:\ProgramData\catpmi.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:940
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
477KB
MD571e38cb8371fa644436922e0eee6040d
SHA16e9e897cb95fd8434891e87a584f5f1b9482cae2
SHA2562c97f31658ca63791439d384a5c4488bdca89adac6c363c2cc97e5763af30db4
SHA512852954de6ce9732c6533d475ebd22f308c5659690d5197dd5865cde0ef740b40f380035baf8d9e6e38dc0541b5f16ffb01ea1560cbb89528ec4b2214c7fcc3be
-
Filesize
454KB
MD5c3bbaf87754019675200fd1301b37521
SHA1db9ed41f3e8958826eecf93ff6116ad16d7f1126
SHA2562f8e5128fc04cc810bba3485d7e4d1b0ef2e73e2699fb3e14cb80dd5f3d1f8e3
SHA512af73457fddc9fac7dca8c53601b7cc31339f4146fea81fe1a89cd4a26c3f1cc8c2adcddc1eebca8bc7b27b135e94bc1e64fdc21c513370fdc71a2a8e5d7564c2
-
Filesize
454KB
MD5c3bbaf87754019675200fd1301b37521
SHA1db9ed41f3e8958826eecf93ff6116ad16d7f1126
SHA2562f8e5128fc04cc810bba3485d7e4d1b0ef2e73e2699fb3e14cb80dd5f3d1f8e3
SHA512af73457fddc9fac7dca8c53601b7cc31339f4146fea81fe1a89cd4a26c3f1cc8c2adcddc1eebca8bc7b27b135e94bc1e64fdc21c513370fdc71a2a8e5d7564c2
-
Filesize
454KB
MD5c3bbaf87754019675200fd1301b37521
SHA1db9ed41f3e8958826eecf93ff6116ad16d7f1126
SHA2562f8e5128fc04cc810bba3485d7e4d1b0ef2e73e2699fb3e14cb80dd5f3d1f8e3
SHA512af73457fddc9fac7dca8c53601b7cc31339f4146fea81fe1a89cd4a26c3f1cc8c2adcddc1eebca8bc7b27b135e94bc1e64fdc21c513370fdc71a2a8e5d7564c2
-
Filesize
454KB
MD5c3bbaf87754019675200fd1301b37521
SHA1db9ed41f3e8958826eecf93ff6116ad16d7f1126
SHA2562f8e5128fc04cc810bba3485d7e4d1b0ef2e73e2699fb3e14cb80dd5f3d1f8e3
SHA512af73457fddc9fac7dca8c53601b7cc31339f4146fea81fe1a89cd4a26c3f1cc8c2adcddc1eebca8bc7b27b135e94bc1e64fdc21c513370fdc71a2a8e5d7564c2