Analysis

  • max time kernel
    188s
  • max time network
    196s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2022 17:15

General

  • Target

    4eab6ff74803fe38704ba7cd524f32f90c9346a5c37f659bba916a232384a6a4.exe

  • Size

    137KB

  • MD5

    2a95c5a6b7d2918baa2e652ae3184cdd

  • SHA1

    baf70ba6b17c15720b9d7cd1cdc9e1c4b53e0148

  • SHA256

    4eab6ff74803fe38704ba7cd524f32f90c9346a5c37f659bba916a232384a6a4

  • SHA512

    b058f537d4511d7a3b9cc84f2de211c2f5c299425610b6e3754a1e4ffbbf917512e4e5064b3251e008e835cf2d4d6becfede1307aefad77f108e260d56c99fa3

  • SSDEEP

    1536:7+uAoFUlrkqG3p26gEOQBApzaSxI81jkfenLBKBJX8LYlo0yaI3EgcBCFEc5T8YH:6hNGujR9msKBdVyEgcBCFEAT8Y+e

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4eab6ff74803fe38704ba7cd524f32f90c9346a5c37f659bba916a232384a6a4.exe
    "C:\Users\Admin\AppData\Local\Temp\4eab6ff74803fe38704ba7cd524f32f90c9346a5c37f659bba916a232384a6a4.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1148
    • C:\Windows\SysWOW64\cmd.exe
      cmd /D /R type "C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe" > ___ && move /Y ___ "C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe"
      2⤵
        PID:4576
      • C:\Windows\SysWOW64\cmd.exe
        cmd /D /R ping -n 10 localhost && del "C:\Users\Admin\AppData\Local\Temp\4eab6ff74803fe38704ba7cd524f32f90c9346a5c37f659bba916a232384a6a4.exe" && start /B "" "C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe" && exit
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4404
        • C:\Windows\SysWOW64\PING.EXE
          ping -n 10 localhost
          3⤵
          • Runs ping.exe
          PID:64
        • C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe
          "C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe"
          3⤵
          • Executes dropped EXE
          • Modifies Installed Components in the registry
          • Adds Run key to start application
          • Modifies system certificate store
          PID:208

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2386679933-1492765628-3466841596-1000\3310a4fa6cb9c60504498d7eea986fc2_8329e3af-909b-464f-88cb-23d8b2c5eadf

      Filesize

      50B

      MD5

      45218adff3ea5bde8a8f61987f0f458b

      SHA1

      cf7fffa410795cc2f7703755f0acd17b51a44ad7

      SHA256

      f95361b82464704675f559b13c007c9567e5914984042f537122383e747194d4

      SHA512

      8442cac48931075ec5bd31ea82faffc4f64d7b6845d5c477d06fc3d7eefeac1fa366b6880a85709a520a343b5dd3771e69bc4b7482cde50e69e04215927a2018

    • C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe

      Filesize

      137KB

      MD5

      2a95c5a6b7d2918baa2e652ae3184cdd

      SHA1

      baf70ba6b17c15720b9d7cd1cdc9e1c4b53e0148

      SHA256

      4eab6ff74803fe38704ba7cd524f32f90c9346a5c37f659bba916a232384a6a4

      SHA512

      b058f537d4511d7a3b9cc84f2de211c2f5c299425610b6e3754a1e4ffbbf917512e4e5064b3251e008e835cf2d4d6becfede1307aefad77f108e260d56c99fa3

    • C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe

      Filesize

      137KB

      MD5

      2a95c5a6b7d2918baa2e652ae3184cdd

      SHA1

      baf70ba6b17c15720b9d7cd1cdc9e1c4b53e0148

      SHA256

      4eab6ff74803fe38704ba7cd524f32f90c9346a5c37f659bba916a232384a6a4

      SHA512

      b058f537d4511d7a3b9cc84f2de211c2f5c299425610b6e3754a1e4ffbbf917512e4e5064b3251e008e835cf2d4d6becfede1307aefad77f108e260d56c99fa3

    • C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe

      Filesize

      137KB

      MD5

      2a95c5a6b7d2918baa2e652ae3184cdd

      SHA1

      baf70ba6b17c15720b9d7cd1cdc9e1c4b53e0148

      SHA256

      4eab6ff74803fe38704ba7cd524f32f90c9346a5c37f659bba916a232384a6a4

      SHA512

      b058f537d4511d7a3b9cc84f2de211c2f5c299425610b6e3754a1e4ffbbf917512e4e5064b3251e008e835cf2d4d6becfede1307aefad77f108e260d56c99fa3

    • memory/64-136-0x0000000000000000-mapping.dmp

    • memory/208-137-0x0000000000000000-mapping.dmp

    • memory/208-141-0x0000000002480000-0x00000000025A1000-memory.dmp

      Filesize

      1.1MB

    • memory/1148-132-0x0000000002610000-0x0000000002731000-memory.dmp

      Filesize

      1.1MB

    • memory/4404-135-0x0000000000000000-mapping.dmp

    • memory/4576-133-0x0000000000000000-mapping.dmp