Analysis
-
max time kernel
61s -
max time network
68s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 16:42
Static task
static1
Behavioral task
behavioral1
Sample
39195fbcba96127811a1ff9fc041b017c5cb5cecd4648b6b83786024cf89ca13.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
39195fbcba96127811a1ff9fc041b017c5cb5cecd4648b6b83786024cf89ca13.exe
Resource
win10v2004-20221111-en
General
-
Target
39195fbcba96127811a1ff9fc041b017c5cb5cecd4648b6b83786024cf89ca13.exe
-
Size
2.3MB
-
MD5
d4faaf82ab5f194bc3ec2443995974b1
-
SHA1
d27f0dc0e7d711ee9d4d1cc87b71fc0b8ad67cf5
-
SHA256
39195fbcba96127811a1ff9fc041b017c5cb5cecd4648b6b83786024cf89ca13
-
SHA512
d5708982e9ec93df6d43607e60644ad93f1cbfb36075ad1db66fd589062aff6b82177131298a633fe4d926170e677a2cbca274ad8929c93d9a6eb2bc8737461a
-
SSDEEP
49152:5qTJSWqYh2b65ESIMpbK8uG2t8wXNTK8gj7zq:5qTQPYppBu3bXDgb
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
39195fbcba96127811a1ff9fc041b017c5cb5cecd4648b6b83786024cf89ca13.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\CaRtAgA = "\"C:\\Users\\Admin\\AppData\\Local\\CaRtAgA.exe\"" 39195fbcba96127811a1ff9fc041b017c5cb5cecd4648b6b83786024cf89ca13.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2028-54-0x0000000075511000-0x0000000075513000-memory.dmpFilesize
8KB