Analysis

  • max time kernel
    91s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/09/2024, 03:14

General

  • Target

    catskidder.exe

  • Size

    145.8MB

  • MD5

    8df86e515a00ffd6e66595d722f91755

  • SHA1

    b2f694bdc2db1974c48297fb1be7ff1786be2c7e

  • SHA256

    09c6a649817b8e41d2ef4b787d783b06e77f985e74c5e1fcdb2449340721c4f6

  • SHA512

    73c1424f64302d5be47534b8c9bdc5268d320701e912957a713664cc34b5778f431ea66aa341331b1ebd92ed9bfe1e7c0961731a42fc00bb1db257347abe90f3

  • SSDEEP

    786432:jMBhE6u+mmzLWN3KPqiVmSYb3Tn3SjPoVEeFZXcNTtLwSTRpf4P1wT1Ubr6u:jV6u+XLTVmSwCroCYJbr6u

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\catskidder.exe
    "C:\Users\Admin\AppData\Local\Temp\catskidder.exe"
    1⤵
    • Checks computer location settings
    • Enumerates system info in registry
    • Suspicious use of AdjustPrivilegeToken
    PID:3672

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3672-0-0x0000000180000000-0x0000000180A25000-memory.dmp

    Filesize

    10.1MB

  • memory/3672-6-0x00007FF61230E000-0x00007FF61230F000-memory.dmp

    Filesize

    4KB

  • memory/3672-3-0x000001DCEA040000-0x000001DCEA060000-memory.dmp

    Filesize

    128KB

  • memory/3672-8-0x000001DCECE10000-0x000001DCEDAC1000-memory.dmp

    Filesize

    12.7MB

  • memory/3672-10-0x000001DCEA080000-0x000001DCEA092000-memory.dmp

    Filesize

    72KB

  • memory/3672-37-0x000001DCEC2A0000-0x000001DCEC39E000-memory.dmp

    Filesize

    1016KB

  • memory/3672-34-0x000001DCEC150000-0x000001DCEC190000-memory.dmp

    Filesize

    256KB

  • memory/3672-31-0x000001DCEC0A0000-0x000001DCEC0C1000-memory.dmp

    Filesize

    132KB

  • memory/3672-25-0x000001DCEC050000-0x000001DCEC063000-memory.dmp

    Filesize

    76KB

  • memory/3672-22-0x000001DCEA0D0000-0x000001DCEA0E8000-memory.dmp

    Filesize

    96KB

  • memory/3672-19-0x000001DCEA060000-0x000001DCEA080000-memory.dmp

    Filesize

    128KB

  • memory/3672-16-0x000001DCEA030000-0x000001DCEA03D000-memory.dmp

    Filesize

    52KB

  • memory/3672-13-0x000001DCEB9C0000-0x000001DCEBA81000-memory.dmp

    Filesize

    772KB

  • memory/3672-43-0x000001DCEC110000-0x000001DCEC11A000-memory.dmp

    Filesize

    40KB

  • memory/3672-40-0x000001DCEA0C0000-0x000001DCEA0C7000-memory.dmp

    Filesize

    28KB

  • memory/3672-46-0x000001DCEDAD0000-0x000001DCEDFD6000-memory.dmp

    Filesize

    5.0MB

  • memory/3672-49-0x000001DCEC460000-0x000001DCEC515000-memory.dmp

    Filesize

    724KB

  • memory/3672-52-0x000001DCEC400000-0x000001DCEC416000-memory.dmp

    Filesize

    88KB

  • memory/3672-55-0x000001DCEC290000-0x000001DCEC295000-memory.dmp

    Filesize

    20KB

  • memory/3672-58-0x000001DCEC540000-0x000001DCEC556000-memory.dmp

    Filesize

    88KB

  • memory/3672-61-0x000001DCEC520000-0x000001DCEC53D000-memory.dmp

    Filesize

    116KB

  • memory/3672-67-0x000001DCECDF0000-0x000001DCECE06000-memory.dmp

    Filesize

    88KB

  • memory/3672-64-0x000001DCECDC0000-0x000001DCECDEA000-memory.dmp

    Filesize

    168KB