Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26-05-2024 03:14
Static task
static1
Behavioral task
behavioral1
Sample
e-catalog.pdf.scr
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
e-catalog.pdf.scr
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
e-cataloge.pdf.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
e-cataloge.pdf.exe
Resource
win10v2004-20240508-en
General
-
Target
e-catalog.pdf.scr
-
Size
1.2MB
-
MD5
3f379c45cf293566709f473ea1f38125
-
SHA1
825af50daf0146a5f16aa6e3f59fa5320def4735
-
SHA256
94b795d57617222666cc16d4c9928841d781ba8d2406a188314e51a48f5d10da
-
SHA512
7a124fe558e4d8d1aed01be8d5d9720e7fc07d2f4a7215392eb4e4883e2191820a2e45f36c922e49aa2989301f379f43361d11558b43f4b6d814140eb6e90add
-
SSDEEP
24576:s+o/NuOhnPXVW9+E7a64d968HFghHqnqXg6cU9KXLNJCR+0MNDjCO4pF:IlvnPlW9+En4d08lghHqqQqoGsDjCNF
Malware Config
Signatures
-
Luminosity 3 IoCs
Luminosity is a RAT family that was on sale, while claiming to be a system administration utility.
Processes:
e-catalog.pdf.scrschtasks.exeschtasks.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000_CLASSES\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 e-catalog.pdf.scr 2704 schtasks.exe 288 schtasks.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
REG.exeREG.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Client Monitor = "cmd /c \"start \"Client Monitor\" \"C:\\Program Files (x86)\\Client\\client.exe\"" REG.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Processes:
e-catalog.pdf.scrdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43 e-catalog.pdf.scr Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 0f00000001000000140000006dca5bd00dcf1c0f327059d374b29ca6e3c50aa6090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030814000000010000001400000045eba2aff492cb82312d518ba7a7219df36dc80f0b00000001000000120000004400690067006900430065007200740000001d00000001000000100000004f5f106930398d09107b40c3c7ca8f1c0300000001000000140000000563b8630d62d75abbc8ab1e4bdfb5a899b24d432000000001000000bb030000308203b73082029fa00302010202100ce7e0e517d846fe8fe560fc1bf03039300d06092a864886f70d01010505003065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a3065310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312430220603550403131b4469676943657274204173737572656420494420526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ad0e15cee443805cb187f3b760f97112a5aedc269488aaf4cef520392858600cf880daa9159532613cb5b128848a8adc9f0a0c83177a8f90ac8ae779535c31842af60f98323676ccdedd3ca8a2ef6afb21f25261df9f20d71fe2b1d9fe1864d2125b5ff9581835bc47cda136f96b7fd4b0383ec11bc38c33d9d82f18fe280fb3a783d6c36e44c061359616fe599c8b766dd7f1a24b0d2bff0b72da9e60d08e9035c678558720a1cfe56d0ac8497c3198336c22e987d0325aa2ba138211ed39179d993a72a1e6faa4d9d5173175ae857d22ae3f014686f62879c8b1dae45717c47e1c0eb0b492a656b3bdb297edaaa7f0b7c5a83f9516d0ffa196eb085f18774f0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e0416041445eba2aff492cb82312d518ba7a7219df36dc80f301f0603551d2304183016801445eba2aff492cb82312d518ba7a7219df36dc80f300d06092a864886f70d01010505000382010100a20ebcdfe2edf0e372737a6494bff77266d832e4427562ae87ebf2d5d9de56b39fccce1428b90d97605c124c58e4d33d834945589735691aa847ea56c679ab12d8678184df7f093c94e6b8262c20bd3db32889f75fff22e297841fe965ef87e0dfc16749b35debb2092aeb26ed78be7d3f2bf3b726356d5f8901b6495b9f01059bab3d25c1ccb67fc2f16f86c6fa6468eb812d94eb42b7fa8c1edd62f1be5067b76cbdf3f11f6b0c3607167f377ca95b6d7af112466083d72704be4bce97bec3672a6811df80e70c3366bf130d146ef37f1f63101efa8d1b256d6c8fa5b76101b1d2a326a110719dade2c3f9c39951b72b0708ce2ee650b2a7fa0a452fa2f0f2 e-catalog.pdf.scr Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 e-catalog.pdf.scr Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\0563B8630D62D75ABBC8AB1E4BDFB5A899B24D43\Blob = 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 e-catalog.pdf.scr -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
e-catalog.pdf.scrpid process 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr 836 e-catalog.pdf.scr -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
e-catalog.pdf.scrpid process 836 e-catalog.pdf.scr -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
e-catalog.pdf.scrclient.exedescription pid process Token: SeDebugPrivilege 836 e-catalog.pdf.scr Token: SeDebugPrivilege 1832 client.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
e-catalog.pdf.scrclient.exepid process 836 e-catalog.pdf.scr 1832 client.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
e-catalog.pdf.scrtaskeng.execlient.exedescription pid process target process PID 836 wrote to memory of 2704 836 e-catalog.pdf.scr schtasks.exe PID 836 wrote to memory of 2704 836 e-catalog.pdf.scr schtasks.exe PID 836 wrote to memory of 2704 836 e-catalog.pdf.scr schtasks.exe PID 836 wrote to memory of 2704 836 e-catalog.pdf.scr schtasks.exe PID 836 wrote to memory of 2728 836 e-catalog.pdf.scr REG.exe PID 836 wrote to memory of 2728 836 e-catalog.pdf.scr REG.exe PID 836 wrote to memory of 2728 836 e-catalog.pdf.scr REG.exe PID 836 wrote to memory of 2728 836 e-catalog.pdf.scr REG.exe PID 1996 wrote to memory of 1832 1996 taskeng.exe client.exe PID 1996 wrote to memory of 1832 1996 taskeng.exe client.exe PID 1996 wrote to memory of 1832 1996 taskeng.exe client.exe PID 1996 wrote to memory of 1832 1996 taskeng.exe client.exe PID 1832 wrote to memory of 288 1832 client.exe schtasks.exe PID 1832 wrote to memory of 288 1832 client.exe schtasks.exe PID 1832 wrote to memory of 288 1832 client.exe schtasks.exe PID 1832 wrote to memory of 288 1832 client.exe schtasks.exe PID 836 wrote to memory of 1832 836 e-catalog.pdf.scr client.exe PID 836 wrote to memory of 1832 836 e-catalog.pdf.scr client.exe PID 836 wrote to memory of 1832 836 e-catalog.pdf.scr client.exe PID 836 wrote to memory of 1832 836 e-catalog.pdf.scr client.exe PID 836 wrote to memory of 1832 836 e-catalog.pdf.scr client.exe PID 1832 wrote to memory of 2180 1832 client.exe REG.exe PID 1832 wrote to memory of 2180 1832 client.exe REG.exe PID 1832 wrote to memory of 2180 1832 client.exe REG.exe PID 1832 wrote to memory of 2180 1832 client.exe REG.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e-catalog.pdf.scr"C:\Users\Admin\AppData\Local\Temp\e-catalog.pdf.scr" /S1⤵
- Luminosity
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "Client Monitor" /tr "'C:\Program Files (x86)\Client\client.exe' /startup" /sc MINUTE /f /rl highest2⤵
- Luminosity
PID:2704
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:642⤵
- Adds Run key to start application
PID:2728
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {816860A1-8303-489C-9D34-B0445AAEDBFC} S-1-5-21-2737914667-933161113-3798636211-1000:PUMARTNR\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Program Files (x86)\Client\client.exe"C:\Program Files (x86)\Client\client.exe" /startup2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "Client Monitor" /tr "'C:\Program Files (x86)\Client\client.exe' /startup" /sc MINUTE /f /rl highest3⤵
- Luminosity
- Creates scheduled task(s)
PID:288
-
-
C:\Windows\SysWOW64\REG.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce" /v "Client Monitor" /d "cmd /c """start """Client Monitor""" """C:\Program Files (x86)\Client\client.exe"""" /f /reg:643⤵
- Adds Run key to start application
PID:2180
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\42B9A473B4DAF01285A36B4D3C7B1662_178C086B699FD6C56B804AF3EF759CB5
Filesize471B
MD5b8580ddaa0a4baef024bf6dc0235a5fd
SHA12b70d795ff52433de6b45fbc180d34f05ac11f34
SHA2560cac8b67ae22816af07ff37e607ec304b1c670ac792f45f34672dc6d613c4d61
SHA512cb77d6b3b3cb20ff7bb84ec0c83e8ff3d0f1c916cdd1b76bf8ad9b4019afdcbde7043603177e19319867e653b386b0396680fafd26b06764df53a8372a1ecd80
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\66AE3BFDF94A732B262342AD2154B86E_108A7991F73F2B507007C35661993162
Filesize471B
MD55fc585ad8ccb121d30a05982c2d33bb1
SHA1a2cb274463a1945a875c80731afd01855abb32e3
SHA25654a4e08a1d51525e6721b5cf219edb9649195c623a57667ea9e53a50c479b01d
SHA5120ecc3f89130f802b38c8ff9a6fab3be68f12b09943529ab877cd8207f3100969e06df2b9bd0d5e61eec1dd9cbc3a34ab99e85fe6bd5dd71afda9736993caa9d7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\42B9A473B4DAF01285A36B4D3C7B1662_178C086B699FD6C56B804AF3EF759CB5
Filesize404B
MD5e63a7a2cb11ad617175f1a0576016f92
SHA1df81eb5f55f1215133708f68722ab808e9faa066
SHA256004f8c633f0157d1260dba4f324cfb5b256cbb7e2e4e0f6d54b4df423e63f158
SHA5126002718596859f5e7deae3aa6fd0de37eb73eff7588b1c7614816f21cb3c26ebd24ea3cadd683f5c13a4ab8c079465f784677fed3282047f4646d613df11bc08
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\66AE3BFDF94A732B262342AD2154B86E_108A7991F73F2B507007C35661993162
Filesize400B
MD5259b6f9431539a42faf5e680a43dba49
SHA1717a63f91a2164d9e7ca9a784cf4219265527e05
SHA25632e48ab1abbf614af787d505af6dae6b7b5929b5831e54ab83e10746e7247a0a
SHA5125300d238b159abec6af586c77b356738383b7d5f0ebea748df773978e86a9e1634321f5ad2b74f50ff974289b7690f4b700343e18c213298a8a6514e3e5ca3b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5a3df5f355f4981f875e02882dae4360c
SHA1a2acdd662e97adfcdbdf542e9ee060c0bba6ac67
SHA2569e2425bdc08bd9340b8572b29e74cd9275f71da07199aac30f023dfeee86457c
SHA512b213162bbb4443f5b08cc9927f1018950193c17ef0f7c8416786354a0a4a4f4592cf5c8f0bd979d08607088eb356754efea078795c0227834e9660f87cd9ef57
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a