Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
02/09/2023, 23:11
Static task
static1
Behavioral task
behavioral1
Sample
loader.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
loader.exe
Resource
win10-20230703-en
Behavioral task
behavioral3
Sample
loader.exe
Resource
win10v2004-20230831-en
General
-
Target
loader.exe
-
Size
136KB
-
MD5
400ac159bdf6bcd0d9edf4bdd26c1966
-
SHA1
9a67fb31a3b7fe4d4ac2c810c987f35d70be5f76
-
SHA256
398d91f171775594561f530cd8852cf852b02a5147b905faabad162394810b1e
-
SHA512
b21de56202385f5e3215e806111b03b122db205934be82590092f9422ae3d3e43351ac0a6a1651e156380d72a70301493447936b5d5687532574ce5afd2529e6
-
SSDEEP
1536:BVHIm3fE6UrdqKctZEitYy9mjEqw2jXsCdUrAhRYcJh4zHCvkbySEziTJ8rEHQCb:t6woIzCc4oJnZOj9O2nX3egzcIcTYg
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2644 XClient.exe 2776 CatFN_Loader.exe -
Loads dropped DLL 1 IoCs
pid Process 2936 loader.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2688 powershell.exe 1140 powershell.exe 2644 XClient.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2644 XClient.exe Token: SeDebugPrivilege 2688 powershell.exe Token: SeDebugPrivilege 1140 powershell.exe Token: SeDebugPrivilege 2644 XClient.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2644 XClient.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2936 wrote to memory of 2644 2936 loader.exe 28 PID 2936 wrote to memory of 2644 2936 loader.exe 28 PID 2936 wrote to memory of 2644 2936 loader.exe 28 PID 2936 wrote to memory of 2776 2936 loader.exe 29 PID 2936 wrote to memory of 2776 2936 loader.exe 29 PID 2936 wrote to memory of 2776 2936 loader.exe 29 PID 2776 wrote to memory of 2676 2776 CatFN_Loader.exe 31 PID 2776 wrote to memory of 2676 2776 CatFN_Loader.exe 31 PID 2776 wrote to memory of 2676 2776 CatFN_Loader.exe 31 PID 2776 wrote to memory of 2808 2776 CatFN_Loader.exe 32 PID 2776 wrote to memory of 2808 2776 CatFN_Loader.exe 32 PID 2776 wrote to memory of 2808 2776 CatFN_Loader.exe 32 PID 2776 wrote to memory of 2664 2776 CatFN_Loader.exe 34 PID 2776 wrote to memory of 2664 2776 CatFN_Loader.exe 34 PID 2776 wrote to memory of 2664 2776 CatFN_Loader.exe 34 PID 2776 wrote to memory of 1724 2776 CatFN_Loader.exe 33 PID 2776 wrote to memory of 1724 2776 CatFN_Loader.exe 33 PID 2776 wrote to memory of 1724 2776 CatFN_Loader.exe 33 PID 2776 wrote to memory of 3040 2776 CatFN_Loader.exe 35 PID 2776 wrote to memory of 3040 2776 CatFN_Loader.exe 35 PID 2776 wrote to memory of 3040 2776 CatFN_Loader.exe 35 PID 2776 wrote to memory of 2920 2776 CatFN_Loader.exe 36 PID 2776 wrote to memory of 2920 2776 CatFN_Loader.exe 36 PID 2776 wrote to memory of 2920 2776 CatFN_Loader.exe 36 PID 2776 wrote to memory of 2640 2776 CatFN_Loader.exe 37 PID 2776 wrote to memory of 2640 2776 CatFN_Loader.exe 37 PID 2776 wrote to memory of 2640 2776 CatFN_Loader.exe 37 PID 2776 wrote to memory of 2904 2776 CatFN_Loader.exe 38 PID 2776 wrote to memory of 2904 2776 CatFN_Loader.exe 38 PID 2776 wrote to memory of 2904 2776 CatFN_Loader.exe 38 PID 2776 wrote to memory of 2912 2776 CatFN_Loader.exe 39 PID 2776 wrote to memory of 2912 2776 CatFN_Loader.exe 39 PID 2776 wrote to memory of 2912 2776 CatFN_Loader.exe 39 PID 2776 wrote to memory of 2536 2776 CatFN_Loader.exe 40 PID 2776 wrote to memory of 2536 2776 CatFN_Loader.exe 40 PID 2776 wrote to memory of 2536 2776 CatFN_Loader.exe 40 PID 2776 wrote to memory of 2616 2776 CatFN_Loader.exe 41 PID 2776 wrote to memory of 2616 2776 CatFN_Loader.exe 41 PID 2776 wrote to memory of 2616 2776 CatFN_Loader.exe 41 PID 2776 wrote to memory of 1360 2776 CatFN_Loader.exe 43 PID 2776 wrote to memory of 1360 2776 CatFN_Loader.exe 43 PID 2776 wrote to memory of 1360 2776 CatFN_Loader.exe 43 PID 2644 wrote to memory of 2688 2644 XClient.exe 44 PID 2644 wrote to memory of 2688 2644 XClient.exe 44 PID 2644 wrote to memory of 2688 2644 XClient.exe 44 PID 2644 wrote to memory of 1140 2644 XClient.exe 46 PID 2644 wrote to memory of 1140 2644 XClient.exe 46 PID 2644 wrote to memory of 1140 2644 XClient.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\loader.exe"C:\Users\Admin\AppData\Local\Temp\loader.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Public\XClient.exe"C:\Users\Public\XClient.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Public\XClient.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1140
-
-
-
C:\Users\Public\CatFN_Loader.exe"C:\Users\Public\CatFN_Loader.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:2676
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:2808
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:1724
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:2664
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:3040
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:2920
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:2640
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:2904
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:2912
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:2536
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:2616
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:1360
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD50022b2f1085caa33c066f1290306a127
SHA104c79419167001e78f7b57a2be4e73774756bc46
SHA25695442ba580115e39db66ecb025aacebaa241cfad2f2a26f1b7d01bfd52066700
SHA512cae43da6ca45335e8ac30fffd07850ccdd9c3546ccbe68b8ff79016260b883ec6aa4b4fa4beb0c11523b00989742214c69475dab6a8159fbfc92e9dcd49a6b29
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\LV2P3GQYHPN2D05WVH3Y.temp
Filesize7KB
MD50022b2f1085caa33c066f1290306a127
SHA104c79419167001e78f7b57a2be4e73774756bc46
SHA25695442ba580115e39db66ecb025aacebaa241cfad2f2a26f1b7d01bfd52066700
SHA512cae43da6ca45335e8ac30fffd07850ccdd9c3546ccbe68b8ff79016260b883ec6aa4b4fa4beb0c11523b00989742214c69475dab6a8159fbfc92e9dcd49a6b29
-
Filesize
47KB
MD5893e3a5e142dd9a60c4e266552189742
SHA1b2c28a9afc06917c83fb40471bef55678536c2c3
SHA256e41a0f77b58a92561b4e5b669a689dfbd91516b68e715705a7848554d2c7274b
SHA51272db92655a20154d813155efe5af2c22ac782845002ee52460119b5e4cd0599c0f3be8c768eb456b3e6f8c63d40b3a57962003ab6c035944553f39a7ce972fc1
-
Filesize
75KB
MD5538c972cbc1c1dcb719a97219bbf3814
SHA15fb9600425906b620195eaf99ef87f7a0b5589b8
SHA256fb171b385febe127ac39470d49c414d782ec9cb6ac05ad086bb8f47805fe3556
SHA512d888a0e6ffaff8e3bcd4f648d7f172162b26bf43df0b1b69189b6a7d5ea284e0c2ccbc0ffde81d07cd6b34edbabde3da4cbd10b9e33be025eb89868557882ecc
-
Filesize
75KB
MD5538c972cbc1c1dcb719a97219bbf3814
SHA15fb9600425906b620195eaf99ef87f7a0b5589b8
SHA256fb171b385febe127ac39470d49c414d782ec9cb6ac05ad086bb8f47805fe3556
SHA512d888a0e6ffaff8e3bcd4f648d7f172162b26bf43df0b1b69189b6a7d5ea284e0c2ccbc0ffde81d07cd6b34edbabde3da4cbd10b9e33be025eb89868557882ecc
-
Filesize
47KB
MD5893e3a5e142dd9a60c4e266552189742
SHA1b2c28a9afc06917c83fb40471bef55678536c2c3
SHA256e41a0f77b58a92561b4e5b669a689dfbd91516b68e715705a7848554d2c7274b
SHA51272db92655a20154d813155efe5af2c22ac782845002ee52460119b5e4cd0599c0f3be8c768eb456b3e6f8c63d40b3a57962003ab6c035944553f39a7ce972fc1