Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28-01-2024 12:35
Static task
static1
Behavioral task
behavioral1
Sample
7d2564fd91b3d55cc05444e5ecd130b9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7d2564fd91b3d55cc05444e5ecd130b9.exe
Resource
win10v2004-20231215-en
General
-
Target
7d2564fd91b3d55cc05444e5ecd130b9.exe
-
Size
14KB
-
MD5
7d2564fd91b3d55cc05444e5ecd130b9
-
SHA1
15e8b093cc16e88896075d53f1ffa5f6471dde98
-
SHA256
9ad8c1076f01d08ecb43551e1deb7661c9835504ddd3dba2b4715c43b3b5a011
-
SHA512
9b2050d9e750ec7e2117137520cf9ba5d0a920a54a2a256f446cb34a3f9e2dd7c0d9b711bba78b534579d72835b490a61bd33672ddf3c37f86a2ac2533d02556
-
SSDEEP
384:5iSFwTQthMrlZzyhWmB8dsxwf4XfSLNlZ7:5RF9ilZ2PB8dQw22b
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\catsrvwl.dll = "{AF976DCD-754F-4ac2-BE49-951DC7AA57D2}" 7d2564fd91b3d55cc05444e5ecd130b9.exe -
Deletes itself 1 IoCs
pid Process 2584 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 1432 7d2564fd91b3d55cc05444e5ecd130b9.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\catsrvwl.tmp 7d2564fd91b3d55cc05444e5ecd130b9.exe File opened for modification C:\Windows\SysWOW64\catsrvwl.tmp 7d2564fd91b3d55cc05444e5ecd130b9.exe File opened for modification C:\Windows\SysWOW64\catsrvwl.nls 7d2564fd91b3d55cc05444e5ecd130b9.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AF976DCD-754F-4ac2-BE49-951DC7AA57D2} 7d2564fd91b3d55cc05444e5ecd130b9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AF976DCD-754F-4ac2-BE49-951DC7AA57D2}\InProcServer32 7d2564fd91b3d55cc05444e5ecd130b9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AF976DCD-754F-4ac2-BE49-951DC7AA57D2}\InProcServer32\ = "C:\\Windows\\SysWow64\\catsrvwl.dll" 7d2564fd91b3d55cc05444e5ecd130b9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AF976DCD-754F-4ac2-BE49-951DC7AA57D2}\InProcServer32\ThreadingModel = "Apartment" 7d2564fd91b3d55cc05444e5ecd130b9.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1432 7d2564fd91b3d55cc05444e5ecd130b9.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1432 7d2564fd91b3d55cc05444e5ecd130b9.exe 1432 7d2564fd91b3d55cc05444e5ecd130b9.exe 1432 7d2564fd91b3d55cc05444e5ecd130b9.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1432 wrote to memory of 2584 1432 7d2564fd91b3d55cc05444e5ecd130b9.exe 28 PID 1432 wrote to memory of 2584 1432 7d2564fd91b3d55cc05444e5ecd130b9.exe 28 PID 1432 wrote to memory of 2584 1432 7d2564fd91b3d55cc05444e5ecd130b9.exe 28 PID 1432 wrote to memory of 2584 1432 7d2564fd91b3d55cc05444e5ecd130b9.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d2564fd91b3d55cc05444e5ecd130b9.exe"C:\Users\Admin\AppData\Local\Temp\7d2564fd91b3d55cc05444e5ecd130b9.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\A525.tmp.bat2⤵
- Deletes itself
PID:2584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
179B
MD51c205466e4a81981e487ad70fe9b0aea
SHA164993681e5fdba9ae3b0a1bbb3ae995c038b9dc2
SHA256165a67a042fb550c711582dadf74d6212adcba26d131c6734c0b48997a089765
SHA512404932a85f33463610f1d423ea8feee9d73b1da2e0b892f2196450bc0dcba1140c54157a45eb9f5206d48637bdf9c6933c39fa252713c37f039e9820ee759d02
-
Filesize
428B
MD59236c98111edb589c4793af7237eb94e
SHA1e9c15be1e3574bc319be7c871648c8f748166881
SHA256a795f0005cc05e6e4c2be2a3b991a1d9ef08492caea1eb6d8cad1c07c1b7ae0a
SHA512d3f4a30deafe29e6078a9f28c8398ab32121d257f91532597ad88a25c99d01cb12c0bf39331590a589ad2230b0a96f9830210b25426c21fd0822c6763f6a68ba
-
Filesize
891KB
MD5843e4fdc2affa2d5ecfc0756b0afac49
SHA11865124ae42fab6139d96bfe1d8f9f6583b2c450
SHA256b2a79e2f110ec52574fca7fe95b55e74c8f2ccc6b311c9a7abfbef01602f63b4
SHA5128114093e82c25e377753bfc5a0f53aaaec7db9f5e9d72f6871cfe2e375bb88199dafd0e219280af44e0c16c76f08f791f40633940a93ada52f21ac140ff02199