Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/01/2024, 06:21
Static task
static1
Behavioral task
behavioral1
Sample
7f1c642acab076d5037e1ed13894a76e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7f1c642acab076d5037e1ed13894a76e.exe
Resource
win10v2004-20231222-en
General
-
Target
7f1c642acab076d5037e1ed13894a76e.exe
-
Size
174KB
-
MD5
7f1c642acab076d5037e1ed13894a76e
-
SHA1
f8f0ec494d03109c1c02ca348a3d4e084d97ba8f
-
SHA256
83c15060c5dc1eee040a8e40ac0a81fb07614129e8466c78ecf25bc2de056ef3
-
SHA512
8016484fb5663c16f3a39b13bfe7516573f41bcac8328ca9dc5a634cd6b21ec371e18e2633cac31703a9db7de2ca97aa3cf88e0a137667ea6cbf5f4dd9ca9d00
-
SSDEEP
3072:/YbrVGnnewJdmcvrQ8z/fT+8MI40j1kRbqV8DBLlS9plzdktpLitNZ+:/Yb5Gne2dmcvrhi8Mt0qqSS9pZwpGn8
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0009000000012252-11.dat acprotect -
Deletes itself 1 IoCs
pid Process 2292 ~38EB.tmp -
Executes dropped EXE 2 IoCs
pid Process 1244 catsddem.exe 2292 ~38EB.tmp -
Loads dropped DLL 5 IoCs
pid Process 1320 7f1c642acab076d5037e1ed13894a76e.exe 1320 7f1c642acab076d5037e1ed13894a76e.exe 1244 catsddem.exe 1320 7f1c642acab076d5037e1ed13894a76e.exe 1320 7f1c642acab076d5037e1ed13894a76e.exe -
resource yara_rule behavioral1/files/0x0009000000012252-11.dat upx behavioral1/memory/1244-22-0x0000000010000000-0x0000000010034000-memory.dmp upx -
Modifies WinLogon 2 TTPs 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\mspmtwnl catsddem.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify catsddem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\mspmtwnl\DllName = "C:\\Windows\\system32\\mspmtwnl.dll" catsddem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\mspmtwnl\Startup = "WlxStartupEvent" catsddem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\mspmtwnl\Shutdown = "WlxShutdownEvent" catsddem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\mspmtwnl\Impersonate = "0" catsddem.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\mspmtwnl\Asynchronous = "0" catsddem.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\mspmtwnl.dll 7f1c642acab076d5037e1ed13894a76e.exe File created C:\Windows\SysWOW64\catsddem.exe 7f1c642acab076d5037e1ed13894a76e.exe File created C:\Windows\SysWOW64\mspmtwnl.exe catsddem.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1244 catsddem.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1320 wrote to memory of 1244 1320 7f1c642acab076d5037e1ed13894a76e.exe 28 PID 1320 wrote to memory of 1244 1320 7f1c642acab076d5037e1ed13894a76e.exe 28 PID 1320 wrote to memory of 1244 1320 7f1c642acab076d5037e1ed13894a76e.exe 28 PID 1320 wrote to memory of 1244 1320 7f1c642acab076d5037e1ed13894a76e.exe 28 PID 1320 wrote to memory of 2292 1320 7f1c642acab076d5037e1ed13894a76e.exe 29 PID 1320 wrote to memory of 2292 1320 7f1c642acab076d5037e1ed13894a76e.exe 29 PID 1320 wrote to memory of 2292 1320 7f1c642acab076d5037e1ed13894a76e.exe 29 PID 1320 wrote to memory of 2292 1320 7f1c642acab076d5037e1ed13894a76e.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f1c642acab076d5037e1ed13894a76e.exe"C:\Users\Admin\AppData\Local\Temp\7f1c642acab076d5037e1ed13894a76e.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\catsddem.exeC:\Windows\system32\catsddem.exe C:\Windows\system32\mspmtwnl.dll2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies WinLogon
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1244
-
-
C:\Users\Admin\AppData\Local\Temp\~38EB.tmpC:\Users\Admin\AppData\Local\Temp\~38EB.tmp C:\Users\Admin\AppData\Local\Temp\7F1C64~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
PID:2292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152KB
MD5b993f241ec4b01319ee5020d9e747533
SHA119fd0dfd6de50c1435e4b8d30a0029e875cbfdfa
SHA2568bcf68eb3061d328353d70c636665338ea22efa37a4a64bab356d470fd0a1c44
SHA5124578d1d7fffe0d581ffa5547f006083030beec27e5c69bbab97fbc08f7300b9047550079e1133a21d8db57e1a8198091625c47b35ad90cbc7750b9a2aae8cda2
-
Filesize
2KB
MD55011564736c349cc96552257b2b823f9
SHA11f93d5ea9c4345c31abf990de730e4136845cc6a
SHA256cd10ea0c1b781f41aa78d47920308be00c46479a5f280e5bcb0904da23c58717
SHA512f023546dc9adacfd7362cd985d51cb4878f2d2299a3068ef18db84fa73e543e933180b7b0f598561458226b28f754b34a2f5dee042ef7bd0541ff7d726bc1342
-
Filesize
2KB
MD506ae479996ab2ecf81a02cc9b918e9a8
SHA1f8eddac58f3d895c14ce8a41f99cf207558e55e4
SHA25608fdef05606048cb7ce8e94948cecdca649535b2e9e7eb97efae83889c65f3b5
SHA5124176b9486335119a4df87977d1fbc3940e069e39badea0315d0d1131994dfad997c8bdbf9915613a17ad367512cdbc893247ca6fee377a0c789895cfae6f2d41