Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2024 12:35
Static task
static1
Behavioral task
behavioral1
Sample
7d2564fd91b3d55cc05444e5ecd130b9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7d2564fd91b3d55cc05444e5ecd130b9.exe
Resource
win10v2004-20231215-en
General
-
Target
7d2564fd91b3d55cc05444e5ecd130b9.exe
-
Size
14KB
-
MD5
7d2564fd91b3d55cc05444e5ecd130b9
-
SHA1
15e8b093cc16e88896075d53f1ffa5f6471dde98
-
SHA256
9ad8c1076f01d08ecb43551e1deb7661c9835504ddd3dba2b4715c43b3b5a011
-
SHA512
9b2050d9e750ec7e2117137520cf9ba5d0a920a54a2a256f446cb34a3f9e2dd7c0d9b711bba78b534579d72835b490a61bd33672ddf3c37f86a2ac2533d02556
-
SSDEEP
384:5iSFwTQthMrlZzyhWmB8dsxwf4XfSLNlZ7:5RF9ilZ2PB8dQw22b
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\catsrvwl.dll = "{AF976DCD-754F-4ac2-BE49-951DC7AA57D2}" 7d2564fd91b3d55cc05444e5ecd130b9.exe -
Loads dropped DLL 1 IoCs
pid Process 5024 7d2564fd91b3d55cc05444e5ecd130b9.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\catsrvwl.tmp 7d2564fd91b3d55cc05444e5ecd130b9.exe File opened for modification C:\Windows\SysWOW64\catsrvwl.tmp 7d2564fd91b3d55cc05444e5ecd130b9.exe File opened for modification C:\Windows\SysWOW64\catsrvwl.nls 7d2564fd91b3d55cc05444e5ecd130b9.exe -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AF976DCD-754F-4ac2-BE49-951DC7AA57D2} 7d2564fd91b3d55cc05444e5ecd130b9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AF976DCD-754F-4ac2-BE49-951DC7AA57D2}\InProcServer32 7d2564fd91b3d55cc05444e5ecd130b9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AF976DCD-754F-4ac2-BE49-951DC7AA57D2}\InProcServer32\ = "C:\\Windows\\SysWow64\\catsrvwl.dll" 7d2564fd91b3d55cc05444e5ecd130b9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AF976DCD-754F-4ac2-BE49-951DC7AA57D2}\InProcServer32\ThreadingModel = "Apartment" 7d2564fd91b3d55cc05444e5ecd130b9.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5024 7d2564fd91b3d55cc05444e5ecd130b9.exe 5024 7d2564fd91b3d55cc05444e5ecd130b9.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 5024 7d2564fd91b3d55cc05444e5ecd130b9.exe 5024 7d2564fd91b3d55cc05444e5ecd130b9.exe 5024 7d2564fd91b3d55cc05444e5ecd130b9.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5024 wrote to memory of 752 5024 7d2564fd91b3d55cc05444e5ecd130b9.exe 94 PID 5024 wrote to memory of 752 5024 7d2564fd91b3d55cc05444e5ecd130b9.exe 94 PID 5024 wrote to memory of 752 5024 7d2564fd91b3d55cc05444e5ecd130b9.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d2564fd91b3d55cc05444e5ecd130b9.exe"C:\Users\Admin\AppData\Local\Temp\7d2564fd91b3d55cc05444e5ecd130b9.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\E196.tmp.bat2⤵PID:752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
179B
MD51c205466e4a81981e487ad70fe9b0aea
SHA164993681e5fdba9ae3b0a1bbb3ae995c038b9dc2
SHA256165a67a042fb550c711582dadf74d6212adcba26d131c6734c0b48997a089765
SHA512404932a85f33463610f1d423ea8feee9d73b1da2e0b892f2196450bc0dcba1140c54157a45eb9f5206d48637bdf9c6933c39fa252713c37f039e9820ee759d02
-
Filesize
955KB
MD5bd96454d944af64b27bac3c551bb4a47
SHA11bbc0c8f4480f570d34da2b840543dfeeca169d5
SHA256edd97e3177caf66a944e46b2af920a2b12dfb68e24d212c833376d35be9dd884
SHA512a57885ecb0494195dd4aefbdf51827e6bdf4079ad39774013731953f23aa0c6b8561f48672b34ebcfe0c466f14cdf5b7d272216cf6c830ff4cd255e2199be603