Analysis
-
max time kernel
10s -
max time network
11s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2024, 14:04
Static task
static1
Behavioral task
behavioral1
Sample
catbin_test.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
catbin_test.exe
Resource
win10v2004-20240611-en
General
-
Target
catbin_test.exe
-
Size
89KB
-
MD5
c56668c5291b40e16b3cbbabab626ee4
-
SHA1
f68622a89a4ed86f5c1f5f147d58ae1a824c75b9
-
SHA256
511b2a3ae74f152e09db47a7dc5806baf247b20efae0b3b4eb90b5e195d7aec0
-
SHA512
b05de9996c6fcaba14b2741e58d90f0bb0a4355fdd1e058f60d848543d511acab1e0f3477e4b966484c744058e67833cb5db6960857ebe17b749901006937674
-
SSDEEP
1536:T7fbN3eEDhDPA/pICdUkbBtW7upvaLU0bI5taxKo0IOlnToIfPw5OF:P7DhdC6kzWypvaQ0FxyNTBfPB
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 22 discord.com 23 discord.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 2 IoCs
pid Process 4308 timeout.exe 1944 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2447855248-390457009-3660902674-1000\{4970B9D5-E044-4D2D-92D5-95589B1FFB05} msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1664 msedge.exe 1664 msedge.exe 2220 msedge.exe 2220 msedge.exe 1092 msedge.exe 1092 msedge.exe 4976 identity_helper.exe 4976 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4576 wrote to memory of 3008 4576 catbin_test.exe 83 PID 4576 wrote to memory of 3008 4576 catbin_test.exe 83 PID 3008 wrote to memory of 4308 3008 cmd.exe 84 PID 3008 wrote to memory of 4308 3008 cmd.exe 84 PID 3008 wrote to memory of 1944 3008 cmd.exe 85 PID 3008 wrote to memory of 1944 3008 cmd.exe 85 PID 3008 wrote to memory of 2220 3008 cmd.exe 87 PID 3008 wrote to memory of 2220 3008 cmd.exe 87 PID 2220 wrote to memory of 1868 2220 msedge.exe 89 PID 2220 wrote to memory of 1868 2220 msedge.exe 89 PID 2220 wrote to memory of 5112 2220 msedge.exe 91 PID 2220 wrote to memory of 5112 2220 msedge.exe 91 PID 2220 wrote to memory of 5112 2220 msedge.exe 91 PID 2220 wrote to memory of 5112 2220 msedge.exe 91 PID 2220 wrote to memory of 5112 2220 msedge.exe 91 PID 2220 wrote to memory of 5112 2220 msedge.exe 91 PID 2220 wrote to memory of 5112 2220 msedge.exe 91 PID 2220 wrote to memory of 5112 2220 msedge.exe 91 PID 2220 wrote to memory of 5112 2220 msedge.exe 91 PID 2220 wrote to memory of 5112 2220 msedge.exe 91 PID 2220 wrote to memory of 5112 2220 msedge.exe 91 PID 2220 wrote to memory of 5112 2220 msedge.exe 91 PID 2220 wrote to memory of 5112 2220 msedge.exe 91 PID 2220 wrote to memory of 5112 2220 msedge.exe 91 PID 2220 wrote to memory of 5112 2220 msedge.exe 91 PID 2220 wrote to memory of 5112 2220 msedge.exe 91 PID 2220 wrote to memory of 5112 2220 msedge.exe 91 PID 2220 wrote to memory of 5112 2220 msedge.exe 91 PID 2220 wrote to memory of 5112 2220 msedge.exe 91 PID 2220 wrote to memory of 5112 2220 msedge.exe 91 PID 2220 wrote to memory of 5112 2220 msedge.exe 91 PID 2220 wrote to memory of 5112 2220 msedge.exe 91 PID 2220 wrote to memory of 5112 2220 msedge.exe 91 PID 2220 wrote to memory of 5112 2220 msedge.exe 91 PID 2220 wrote to memory of 5112 2220 msedge.exe 91 PID 2220 wrote to memory of 5112 2220 msedge.exe 91 PID 2220 wrote to memory of 5112 2220 msedge.exe 91 PID 2220 wrote to memory of 5112 2220 msedge.exe 91 PID 2220 wrote to memory of 5112 2220 msedge.exe 91 PID 2220 wrote to memory of 5112 2220 msedge.exe 91 PID 2220 wrote to memory of 5112 2220 msedge.exe 91 PID 2220 wrote to memory of 5112 2220 msedge.exe 91 PID 2220 wrote to memory of 5112 2220 msedge.exe 91 PID 2220 wrote to memory of 5112 2220 msedge.exe 91 PID 2220 wrote to memory of 5112 2220 msedge.exe 91 PID 2220 wrote to memory of 5112 2220 msedge.exe 91 PID 2220 wrote to memory of 5112 2220 msedge.exe 91 PID 2220 wrote to memory of 5112 2220 msedge.exe 91 PID 2220 wrote to memory of 5112 2220 msedge.exe 91 PID 2220 wrote to memory of 5112 2220 msedge.exe 91 PID 2220 wrote to memory of 1664 2220 msedge.exe 92 PID 2220 wrote to memory of 1664 2220 msedge.exe 92 PID 2220 wrote to memory of 4348 2220 msedge.exe 93 PID 2220 wrote to memory of 4348 2220 msedge.exe 93 PID 2220 wrote to memory of 4348 2220 msedge.exe 93 PID 2220 wrote to memory of 4348 2220 msedge.exe 93 PID 2220 wrote to memory of 4348 2220 msedge.exe 93 PID 2220 wrote to memory of 4348 2220 msedge.exe 93 PID 2220 wrote to memory of 4348 2220 msedge.exe 93 PID 2220 wrote to memory of 4348 2220 msedge.exe 93 PID 2220 wrote to memory of 4348 2220 msedge.exe 93 PID 2220 wrote to memory of 4348 2220 msedge.exe 93 PID 2220 wrote to memory of 4348 2220 msedge.exe 93 PID 2220 wrote to memory of 4348 2220 msedge.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\catbin_test.exe"C:\Users\Admin\AppData\Local\Temp\catbin_test.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\3086.tmp\3087.tmp\3088.bat C:\Users\Admin\AppData\Local\Temp\catbin_test.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\system32\timeout.exetimeout /t 2 nobreak3⤵
- Delays execution with timeout.exe
PID:4308
-
-
C:\Windows\system32\timeout.exetimeout /t 1 nobreak3⤵
- Delays execution with timeout.exe
PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://canarytokens.com/articles/static/olyxahg00gszb09viv2bua2w3/payments.js3⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffac4b946f8,0x7ffac4b94708,0x7ffac4b947184⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,3126833713161905350,4592680843095108073,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:24⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,3126833713161905350,4592680843095108073,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:34⤵
- Suspicious behavior: EnumeratesProcesses
PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,3126833713161905350,4592680843095108073,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:84⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,3126833713161905350,4592680843095108073,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:14⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,3126833713161905350,4592680843095108073,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:14⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,3126833713161905350,4592680843095108073,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:14⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,3126833713161905350,4592680843095108073,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3752 /prefetch:14⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2168,3126833713161905350,4592680843095108073,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4976 /prefetch:84⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2168,3126833713161905350,4592680843095108073,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5108 /prefetch:84⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,3126833713161905350,4592680843095108073,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5728 /prefetch:84⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,3126833713161905350,4592680843095108073,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5728 /prefetch:84⤵
- Suspicious behavior: EnumeratesProcesses
PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,3126833713161905350,4592680843095108073,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:14⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,3126833713161905350,4592680843095108073,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:14⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,3126833713161905350,4592680843095108073,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4088 /prefetch:14⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,3126833713161905350,4592680843095108073,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:14⤵PID:2440
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3872
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5db9081c34e133c32d02f593df88f047a
SHA1a0da007c14fd0591091924edc44bee90456700c6
SHA256c9cd202ebb55fe8dd3e5563948bab458e947d7ba33bc0f38c6b37ce5d0bd7c3e
SHA51212f9809958b024571891fae646208a76f3823ae333716a5cec303e15c38281db042b7acf95bc6523b6328ac9c8644794d39a0e03d9db196f156a6ee1fb4f2744
-
Filesize
152B
MD53a09f853479af373691d131247040276
SHA11b6f098e04da87e9cf2d3284943ec2144f36ac04
SHA256a358de2c0eba30c70a56022c44a3775aa99ffa819cd7f42f7c45ac358b5e739f
SHA512341cf0f363621ee02525cd398ae0d462319c6a80e05fd25d9aca44234c42a3071b51991d4cf102ac9d89561a1567cbe76dfeaad786a304bec33821ca77080016
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize816B
MD50aeaaece9708db93f0311f327d7eb7a8
SHA170fceb814f11d270a218170c581c1474e602fe6c
SHA256e8edb64a807d63df083fe4cef719d62dbe7c4aa834889fb0d246c8237e9f9ba6
SHA5122e1eed352bcc107630ee6c6beb4cb7c61cafab022a1cfa1ad5f1ea0d583991ef747d25726bc4dd8fb0a0d7b6b429453a1f07127b5daa843ad4f184c8c5cd82f3
-
Filesize
323B
MD5a5a1149047729a493b1a2a65063c39ba
SHA18f1f45cb0c0772dcd05795734cbf408636fb9fb9
SHA256e0ef1f906ea2606c802310437fe799d93e073770ab6549060ee4b9c9c49f2006
SHA5128ce257a087115e2d542657a2b4679d0c100ebdec76e3392cff1bbba133e129f2fcdbd73f9baab92e762bef47a2572d3dc8553fa3858d787d2a0b2bf8f05dc54e
-
Filesize
6KB
MD58d09aebb5df0cd353bde7d8f595bf48c
SHA1db1179c9eb09e912a386ae73d3739dc5d0563b99
SHA2565c9212cc6f5750eca53d143ac29c10413d316ba4e5d425e0c6f08638172a8449
SHA5120413dbe8a7597e86fe659623bdb62270eb6b7ed1af52823ec882fa4e93ccf7d81b57fc806facb35e1b457e1457fa0dccf3df66a756b884ad07f93998905fa781
-
Filesize
7KB
MD57d094bd2dbf91efe76ff6c0f13abb2fc
SHA17ad350d458e3040fa57b1e4835db22f82ad8266c
SHA2568f5f63064128ebcb848c18ef94445fe417719925f32c92269c67d31e0f9f8b9a
SHA512c523b795fe73fe7dce2a429cbbd6f0874abf255bf6ba2c611d9e410095fe226ac37c1d00e8f57828b68a9313dc44b83deec36df7bcda7ec482ca337671cf35b4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD571f19ca8f6cd2eaa326e324486f0f7a1
SHA18b995e7b397e42c1ceaa59672079315d1bcc4b0f
SHA256c1cfeb1bcf5bc9a4d38a8a6ad871330634d5a8f4527f47e10dbc3b4233df9b87
SHA512f960d1958cc256bcbbe5eea5a78907707237d3e5d236ab322bdceeb3569a7db8a2f2a8f681c1cc80d1896a168371f6312f012de6df5aa4885fc01219a2d4fcc9
-
Filesize
282B
MD55455fd6df9f5a3ac02c88ca66be69375
SHA122907d8a749297e6a681d9bffb19d5535f7f4ae8
SHA25645f5946f7cbeab8115a9069150a6632af36fc3dbc0e6587d7efcaf78cfe78786
SHA5123f6a8ea58956ab67b073f465a6413c6341a19967eea41023650824c3a517181ccf318f8a389fbcd9e97f468eb2c4c5625e081f1276829f455c342f71cde85a5b