Analysis

  • max time kernel
    263s
  • max time network
    293s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-11-2022 04:30

General

  • Target

    9e6a1628222295e94b1d15bbfebc0a22d7cf11d78a5785282283215eab062146.exe

  • Size

    77KB

  • MD5

    459a1b62476b2b8c246cbebe23ed6035

  • SHA1

    949ace5987007bb1378e2ef7156920269a609943

  • SHA256

    9e6a1628222295e94b1d15bbfebc0a22d7cf11d78a5785282283215eab062146

  • SHA512

    d7ce41e8ad102917844796cf82bf7da03cbc182aacb39373fe1ba47a63f31993e7e9f5ef2d6a4ee74dd62c0cae43a6e0146866bd4839d4ff638b7a8b0d05b7c4

  • SSDEEP

    1536:ZtHF5geAD7efNm9hQH5kCu6W1STnTpGY1hpJ1xzhP9h/nd4:ZxUD7efkNrQTtDphzhPzd4

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e6a1628222295e94b1d15bbfebc0a22d7cf11d78a5785282283215eab062146.exe
    "C:\Users\Admin\AppData\Local\Temp\9e6a1628222295e94b1d15bbfebc0a22d7cf11d78a5785282283215eab062146.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3424
    • C:\Windows\SysWOW64\cmd.exe
      cmd /D /R type "C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe" > ___ && move /Y ___ "C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe"
      2⤵
        PID:4108
      • C:\Windows\SysWOW64\cmd.exe
        cmd /D /R ping -n 10 localhost && del "C:\Users\Admin\AppData\Local\Temp\9e6a1628222295e94b1d15bbfebc0a22d7cf11d78a5785282283215eab062146.exe" && start /B "" "C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe" && exit
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3324
        • C:\Windows\SysWOW64\PING.EXE
          ping -n 10 localhost
          3⤵
          • Runs ping.exe
          PID:4772
        • C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe
          "C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe"
          3⤵
          • Executes dropped EXE
          PID:3188

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Remote System Discovery

    1
    T1018

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe
      Filesize

      77KB

      MD5

      459a1b62476b2b8c246cbebe23ed6035

      SHA1

      949ace5987007bb1378e2ef7156920269a609943

      SHA256

      9e6a1628222295e94b1d15bbfebc0a22d7cf11d78a5785282283215eab062146

      SHA512

      d7ce41e8ad102917844796cf82bf7da03cbc182aacb39373fe1ba47a63f31993e7e9f5ef2d6a4ee74dd62c0cae43a6e0146866bd4839d4ff638b7a8b0d05b7c4

    • C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe
      Filesize

      77KB

      MD5

      459a1b62476b2b8c246cbebe23ed6035

      SHA1

      949ace5987007bb1378e2ef7156920269a609943

      SHA256

      9e6a1628222295e94b1d15bbfebc0a22d7cf11d78a5785282283215eab062146

      SHA512

      d7ce41e8ad102917844796cf82bf7da03cbc182aacb39373fe1ba47a63f31993e7e9f5ef2d6a4ee74dd62c0cae43a6e0146866bd4839d4ff638b7a8b0d05b7c4

    • memory/3188-138-0x0000000000000000-mapping.dmp
    • memory/3324-136-0x0000000000000000-mapping.dmp
    • memory/3424-133-0x0000000002600000-0x0000000002695000-memory.dmp
      Filesize

      596KB

    • memory/4108-134-0x0000000000000000-mapping.dmp
    • memory/4772-137-0x0000000000000000-mapping.dmp