Analysis
-
max time kernel
188s -
max time network
196s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 17:15
Static task
static1
Behavioral task
behavioral1
Sample
4eab6ff74803fe38704ba7cd524f32f90c9346a5c37f659bba916a232384a6a4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4eab6ff74803fe38704ba7cd524f32f90c9346a5c37f659bba916a232384a6a4.exe
Resource
win10v2004-20221111-en
General
-
Target
4eab6ff74803fe38704ba7cd524f32f90c9346a5c37f659bba916a232384a6a4.exe
-
Size
137KB
-
MD5
2a95c5a6b7d2918baa2e652ae3184cdd
-
SHA1
baf70ba6b17c15720b9d7cd1cdc9e1c4b53e0148
-
SHA256
4eab6ff74803fe38704ba7cd524f32f90c9346a5c37f659bba916a232384a6a4
-
SHA512
b058f537d4511d7a3b9cc84f2de211c2f5c299425610b6e3754a1e4ffbbf917512e4e5064b3251e008e835cf2d4d6becfede1307aefad77f108e260d56c99fa3
-
SSDEEP
1536:7+uAoFUlrkqG3p26gEOQBApzaSxI81jkfenLBKBJX8LYlo0yaI3EgcBCFEc5T8YH:6hNGujR9msKBdVyEgcBCFEAT8Y+e
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
winlogin.exepid process 208 winlogin.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
winlogin.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Active Setup\Installed Components\05F16C88-71D3-42C1-BB4F-E9BAF7DB4A9E winlogin.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\05F16C88-71D3-42C1-BB4F-E9BAF7DB4A9E\cfg = "{9EBE270A-8AA4-4150-8F2D-47CE111B9700}281R }SOCAAGDT " winlogin.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
winlogin.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run winlogin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\winlogin = "C:\\Users\\Admin\\AppData\\Roaming\\Windows\\winlogin.exe" winlogin.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 53 api.ipify.org 91 api.ipify.org -
Processes:
winlogin.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 winlogin.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 5c0000000100000004000000000800000f00000001000000140000003e8e6487f8fd27d322a269a71edaac5d57811286090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e3491900000001000000100000002aa1c05e2ae606f198c2c5e937c97aa2200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e winlogin.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
4eab6ff74803fe38704ba7cd524f32f90c9346a5c37f659bba916a232384a6a4.execmd.exedescription pid process target process PID 1148 wrote to memory of 4576 1148 4eab6ff74803fe38704ba7cd524f32f90c9346a5c37f659bba916a232384a6a4.exe cmd.exe PID 1148 wrote to memory of 4576 1148 4eab6ff74803fe38704ba7cd524f32f90c9346a5c37f659bba916a232384a6a4.exe cmd.exe PID 1148 wrote to memory of 4576 1148 4eab6ff74803fe38704ba7cd524f32f90c9346a5c37f659bba916a232384a6a4.exe cmd.exe PID 1148 wrote to memory of 4404 1148 4eab6ff74803fe38704ba7cd524f32f90c9346a5c37f659bba916a232384a6a4.exe cmd.exe PID 1148 wrote to memory of 4404 1148 4eab6ff74803fe38704ba7cd524f32f90c9346a5c37f659bba916a232384a6a4.exe cmd.exe PID 1148 wrote to memory of 4404 1148 4eab6ff74803fe38704ba7cd524f32f90c9346a5c37f659bba916a232384a6a4.exe cmd.exe PID 4404 wrote to memory of 64 4404 cmd.exe PING.EXE PID 4404 wrote to memory of 64 4404 cmd.exe PING.EXE PID 4404 wrote to memory of 64 4404 cmd.exe PING.EXE PID 4404 wrote to memory of 208 4404 cmd.exe winlogin.exe PID 4404 wrote to memory of 208 4404 cmd.exe winlogin.exe PID 4404 wrote to memory of 208 4404 cmd.exe winlogin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4eab6ff74803fe38704ba7cd524f32f90c9346a5c37f659bba916a232384a6a4.exe"C:\Users\Admin\AppData\Local\Temp\4eab6ff74803fe38704ba7cd524f32f90c9346a5c37f659bba916a232384a6a4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\cmd.execmd /D /R type "C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe" > ___ && move /Y ___ "C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe"2⤵PID:4576
-
C:\Windows\SysWOW64\cmd.execmd /D /R ping -n 10 localhost && del "C:\Users\Admin\AppData\Local\Temp\4eab6ff74803fe38704ba7cd524f32f90c9346a5c37f659bba916a232384a6a4.exe" && start /B "" "C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe" && exit2⤵
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost3⤵
- Runs ping.exe
PID:64 -
C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe"C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe"3⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
- Modifies system certificate store
PID:208
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2386679933-1492765628-3466841596-1000\3310a4fa6cb9c60504498d7eea986fc2_8329e3af-909b-464f-88cb-23d8b2c5eadf
Filesize50B
MD545218adff3ea5bde8a8f61987f0f458b
SHA1cf7fffa410795cc2f7703755f0acd17b51a44ad7
SHA256f95361b82464704675f559b13c007c9567e5914984042f537122383e747194d4
SHA5128442cac48931075ec5bd31ea82faffc4f64d7b6845d5c477d06fc3d7eefeac1fa366b6880a85709a520a343b5dd3771e69bc4b7482cde50e69e04215927a2018
-
Filesize
137KB
MD52a95c5a6b7d2918baa2e652ae3184cdd
SHA1baf70ba6b17c15720b9d7cd1cdc9e1c4b53e0148
SHA2564eab6ff74803fe38704ba7cd524f32f90c9346a5c37f659bba916a232384a6a4
SHA512b058f537d4511d7a3b9cc84f2de211c2f5c299425610b6e3754a1e4ffbbf917512e4e5064b3251e008e835cf2d4d6becfede1307aefad77f108e260d56c99fa3
-
Filesize
137KB
MD52a95c5a6b7d2918baa2e652ae3184cdd
SHA1baf70ba6b17c15720b9d7cd1cdc9e1c4b53e0148
SHA2564eab6ff74803fe38704ba7cd524f32f90c9346a5c37f659bba916a232384a6a4
SHA512b058f537d4511d7a3b9cc84f2de211c2f5c299425610b6e3754a1e4ffbbf917512e4e5064b3251e008e835cf2d4d6becfede1307aefad77f108e260d56c99fa3
-
Filesize
137KB
MD52a95c5a6b7d2918baa2e652ae3184cdd
SHA1baf70ba6b17c15720b9d7cd1cdc9e1c4b53e0148
SHA2564eab6ff74803fe38704ba7cd524f32f90c9346a5c37f659bba916a232384a6a4
SHA512b058f537d4511d7a3b9cc84f2de211c2f5c299425610b6e3754a1e4ffbbf917512e4e5064b3251e008e835cf2d4d6becfede1307aefad77f108e260d56c99fa3