Analysis
-
max time kernel
156s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/03/2024, 18:40
Static task
static1
Behavioral task
behavioral1
Sample
setup_katana_zero_1.0.5_(30035).exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
setup_katana_zero_1.0.5_(30035).exe
Resource
win10v2004-20240226-en
General
-
Target
setup_katana_zero_1.0.5_(30035).exe
-
Size
175.9MB
-
MD5
275a3642a506819785178b133848fe36
-
SHA1
7af438e1754c7a8f277edb03ab05f6f22331ca67
-
SHA256
bdcebe6b1337d638c2570d9781583fffff590c060afca21ede8493b7174de412
-
SHA512
c660cf70d55773c3769b765de0e5ff16fe00d8746ab0179ef3a4fb5bd0044c6b43d9a38489579951351676d7b8146dd90324ccc1511d5f8decf1012be0c53b6b
-
SSDEEP
3145728:NpIC3SSlwLXoA/EIjpDai1L7BJfmiGn2RMWAPBsFsMGrATwVhO12lBzOHBKjjtB2:NpICicgoA/EIjd9ff5WWA81Ue2l1OHB1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2144 setup_katana_zero_1.0.5_(30035).tmp -
Loads dropped DLL 5 IoCs
pid Process 1940 setup_katana_zero_1.0.5_(30035).exe 2144 setup_katana_zero_1.0.5_(30035).tmp 2144 setup_katana_zero_1.0.5_(30035).tmp 2144 setup_katana_zero_1.0.5_(30035).tmp 2144 setup_katana_zero_1.0.5_(30035).tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2144 1940 setup_katana_zero_1.0.5_(30035).exe 28 PID 1940 wrote to memory of 2144 1940 setup_katana_zero_1.0.5_(30035).exe 28 PID 1940 wrote to memory of 2144 1940 setup_katana_zero_1.0.5_(30035).exe 28 PID 1940 wrote to memory of 2144 1940 setup_katana_zero_1.0.5_(30035).exe 28 PID 1940 wrote to memory of 2144 1940 setup_katana_zero_1.0.5_(30035).exe 28 PID 1940 wrote to memory of 2144 1940 setup_katana_zero_1.0.5_(30035).exe 28 PID 1940 wrote to memory of 2144 1940 setup_katana_zero_1.0.5_(30035).exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_katana_zero_1.0.5_(30035).exe"C:\Users\Admin\AppData\Local\Temp\setup_katana_zero_1.0.5_(30035).exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\is-QF36T.tmp\setup_katana_zero_1.0.5_(30035).tmp"C:\Users\Admin\AppData\Local\Temp\is-QF36T.tmp\setup_katana_zero_1.0.5_(30035).tmp" /SL5="$5015C,183845417,192512,C:\Users\Admin\AppData\Local\Temp\setup_katana_zero_1.0.5_(30035).exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2144
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD5cba5334ecac271f33a050df6d644c304
SHA13e258d71996acd5552f912aa6f9b593d561ab87d
SHA2568f6df008e27df617376646721d5389139129436c52d68cc64f4ec0f5a2b1805d
SHA5120ca264fb211f8288e378eb285d5ae906a1939de9edac2268ea6e84a63181914e507741f7bf3ffb2061f4ba26c658acfa9696b1cfffff1039cf29c0e6af760503
-
Filesize
176KB
MD5edb88a8e8f8af6703ea1c56d0d1d5f27
SHA17103bcc99485fc1cfb62026665795f00949e6616
SHA256238b1588b7d66ee14cbe0d411bc5cc1fa59591cb2c00c7d52ee75658e8fcf701
SHA5120dcb3b768214449d12311b91e99e8f2172c95dd5b91919dc98a0ec3e5e417e8adedcfccf4dc354525e1830779bbbed1f5afffa5a1a0f4e8ef0dcc3e4d018d014
-
Filesize
3KB
MD55b43a5d975a53f4fc1da67ce9f7784c1
SHA18543fa1e471030049942252b23cb22e0880c3af5
SHA25659d8bb3e87a89ef523c0495addce38d69560af42aaa82f56dd41b12e6612c13a
SHA5125dd5c4e9859a555a4a32da76f5231b44f7556274c6501da530b2cdd570bcb4675f710bee708322a40ed3ef9280c0d652b4e7ef0e9eaf128c08534f59291917f5
-
Filesize
2KB
MD5461dfeb75927bdb39f9db5348612a611
SHA1b7893b1fff6801e37ee7337d876962a09184941e
SHA2560de278f5ca6d8570d9bda592268a14a28b87d3631fea2d25721947397aaab79c
SHA51268528cf45c81c2c024a672f42c2cd6d4f72c015b443f103ca21deb8ee2bec4f4027490e7f33b5338a87537b5bf7f255f2828aed149f622155ec89cc81687651b
-
Filesize
1KB
MD5c596bc9111edc702bbbb29b70984254f
SHA1d4712c7b91ff4f8994e7907d31357c42eb47c738
SHA2566112851daea2aaa7174e8cfac4a0f61c968bc090342503804c476eff47cc2462
SHA512db50d0a39ec644873a03d64552fff1776cc94f016e8dfc8918e65aee94f7529a6de4637567b5e65c4ea988f3775785c4b52c2d96fe8dbc52b1e21ff59c737c2a
-
Filesize
383KB
MD5f2d4829d52037321c5ddea452034fea5
SHA1871a5a48fc3dfedfac08eca3d6e865a853d62202
SHA2564bb388de79ab74a81ffdab24b6969d63245fea259043ff3d8da44969f78d03ed
SHA512923c7ff925fcee7e2342a4a1ab93fd4da1482607da0313c3c78c229aa4555ba79d308d85f04805d2db19ce634afd08594e7de7f7903a6268f4a4b5a53871c613
-
Filesize
8KB
MD53befe9739354ee24a0b1ea8df05ce274
SHA1ab0bda986a8c46aa19f57b75a2b7b22445a3c625
SHA256b0193ab375f604fa4a25cabdea8f713babde1c07ab562ffc5679352c8e01db47
SHA512ac016a59e0bfc9b22c376ae5d498c5660893a983d932b2bd502dabe032883c69e79ea8d93c2db49f95415c3cdb068e9f7d1d85527a4f9e68e065a989852d09dd
-
Filesize
726B
MD5df10adc25b673e74e19971c17bee5a98
SHA1ee16fb1cf9491f5e611282f0574b27d76fede412
SHA256142b16dc6239421691fa6e619d1a61e61176d89fa018a88b46893c29a57aad8b
SHA512dc3de10e0321966cbbfb2e57b3b41da6f26dff0c7233a47469da58775b5c471e6b5181e4d4ffc81ef8b83dbcad74ccc1aad7678518f99c9185a441d2a23e010f
-
Filesize
1KB
MD5103c1368e60806b1b7995a0894eacf87
SHA1971392527f6e4b655044773132505c901a6b5469
SHA2560d37d4421a39ca8852eb6760b8e914302bdc6cfcc7b170dc1b6c9bb9be148b7e
SHA512652177e94438aff102f2ed873b26f0985ebed134763852b49b1ca2698463c1dbeb85152f19c8e18d397229ec5cb2cd1d17c61d454ab7c425a2cab540adc8228a
-
Filesize
261B
MD52332fd96a1f83a3c31e4ebe6e540adb9
SHA16442cbc120e8da8751f21b4a880e9038cd25b9f0
SHA2563614059e549ae87a8130e785bdcbf88e44754c6d1ab458969fbce119a4eda6cb
SHA5124be2f5ca70843266fa21e1a045037823e0f4211358daae544f44f348819bec0070285a1e185aad0da94ea07dc0f2223f00ab6fc73e93583d0fbd30c1f7acf207
-
Filesize
35KB
MD50177746573eed407f8dca8a9e441aa49
SHA16b462adf78059d26cbc56b3311e3b97fcb8d05f7
SHA256a4b61626a1626fdabec794e4f323484aa0644baa1c905a5dcf785dc34564f008
SHA512d4ac96da2d72e121d1d63d64e78bcea155d62af828324b81889a3cd3928ceeb12f7a22e87e264e34498d100b57cdd3735d2ab2316e1a3bf7fa099ddb75c5071a
-
Filesize
69KB
MD51d51fac9e2384eeb674199cfd5281d7d
SHA1861dfdc121357d605d0cc3793266713788109eb2
SHA25623e90ce5a1f2d634a7bf5d5d0522fafeea6df9e536e16f5ce91035d5197128ec
SHA512921b00adfe43b883200960e8d0958d4e6b97f6d5cfc096ee277766a3e44cc7805a20877a4edf8bd4d9102bb71a20ac218a9a512f4f76bd751d3ef14f4e0a6eda
-
Filesize
63KB
MD51c55ae5ef9980e3b1028447da6105c75
SHA1f85218e10e6aa23b2f5a3ed512895b437e41b45c
SHA2566afa2d104be6efe3d9a2ab96dbb75db31565dad64dd0b791e402ecc25529809f
SHA5121ec4d52f49747b29cfd83e1a75fc6ae4101add68ada0b9add5770c10be6dffb004bb47d0854d50871ed8d77acf67d4e0445e97f0548a95c182e83b94ddf2eb6b
-
Filesize
691KB
MD57db706c324cc9b6fda497d081eed6e26
SHA1ca97392e573af0cf61bfa3301801a85f2beea44c
SHA256cc685dbcf798549ad1a51c1dde45462e2a451ec59f48ee91219182a3871cd5b0
SHA5128edf1494d57d5e708faaff4170f21f435658be897a6fe0acf243ced0701a7fd574b3c973c5bc5e8d92815e966c98977e69ac1e3083ab00c11b072115527ffa19
-
Filesize
1.3MB
MD503082a6a1e000a77be6a5b921c69bbe9
SHA11b9c52a40198158f0cb85ff3f48af0d6416fac8d
SHA25687c07a864e6608f629d76350d65b6f43b603512ad2c8b2f8a2d3fb97d82d1e8f
SHA51275d6aac90c3d698158763567b584bfce2c52d64e50b95b6e04aa36a48198f1a6b4125a3a2bdfab68a945d61c2ef45b1fe94755c39dfdf6b9b57b24225934edd8