Analysis
-
max time kernel
91s -
max time network
94s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 09:21
Static task
static1
Behavioral task
behavioral1
Sample
41514a35b130af2ea475b0cb292166d671f684760febe933ed801f50bb456d88.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
41514a35b130af2ea475b0cb292166d671f684760febe933ed801f50bb456d88.exe
Resource
win10v2004-20220812-en
General
-
Target
41514a35b130af2ea475b0cb292166d671f684760febe933ed801f50bb456d88.exe
-
Size
164KB
-
MD5
09cb12d7cd0228360cd097baeaaa6552
-
SHA1
c4d395545bfe7eb980e811bfeeed40f24b58f27a
-
SHA256
41514a35b130af2ea475b0cb292166d671f684760febe933ed801f50bb456d88
-
SHA512
7195d17421bbcc24e0f9521aa76a7edb527d9dce399d7e53a25ca6f334d522cab5b388aa0b9bc74f4586252f595860330ecb110c442894864f9f6eed5bc98851
-
SSDEEP
3072:v/obD3KFdIbdHqhwBrzmRp8Z/WPGaY7XmlXN2/9uaGXl1wiK4hc0NHg5Jw:v8D3KERHqJCZ+A7XmJmua4whigg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
winlogin.exepid process 848 winlogin.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
winlogin.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Active Setup\Installed Components\05F16C88-71D3-42C1-BB4F-E9BAF7DB4A9E winlogin.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Active Setup\Installed Components\05F16C88-71D3-42C1-BB4F-E9BAF7DB4A9E\cfg = "{22BB4391-71FF-4E7B-AA57-072756237E18}SERV }RYNKSFQE " winlogin.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1496 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 1496 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
winlogin.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run winlogin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winlogin = "C:\\Users\\Admin\\AppData\\Roaming\\Windows\\winlogin.exe" winlogin.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 6 api.ipify.org 4 api.ipify.org 5 api.ipify.org -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
41514a35b130af2ea475b0cb292166d671f684760febe933ed801f50bb456d88.execmd.exedescription pid process target process PID 960 wrote to memory of 1344 960 41514a35b130af2ea475b0cb292166d671f684760febe933ed801f50bb456d88.exe cmd.exe PID 960 wrote to memory of 1344 960 41514a35b130af2ea475b0cb292166d671f684760febe933ed801f50bb456d88.exe cmd.exe PID 960 wrote to memory of 1344 960 41514a35b130af2ea475b0cb292166d671f684760febe933ed801f50bb456d88.exe cmd.exe PID 960 wrote to memory of 1344 960 41514a35b130af2ea475b0cb292166d671f684760febe933ed801f50bb456d88.exe cmd.exe PID 960 wrote to memory of 1496 960 41514a35b130af2ea475b0cb292166d671f684760febe933ed801f50bb456d88.exe cmd.exe PID 960 wrote to memory of 1496 960 41514a35b130af2ea475b0cb292166d671f684760febe933ed801f50bb456d88.exe cmd.exe PID 960 wrote to memory of 1496 960 41514a35b130af2ea475b0cb292166d671f684760febe933ed801f50bb456d88.exe cmd.exe PID 960 wrote to memory of 1496 960 41514a35b130af2ea475b0cb292166d671f684760febe933ed801f50bb456d88.exe cmd.exe PID 1496 wrote to memory of 576 1496 cmd.exe PING.EXE PID 1496 wrote to memory of 576 1496 cmd.exe PING.EXE PID 1496 wrote to memory of 576 1496 cmd.exe PING.EXE PID 1496 wrote to memory of 576 1496 cmd.exe PING.EXE PID 1496 wrote to memory of 848 1496 cmd.exe winlogin.exe PID 1496 wrote to memory of 848 1496 cmd.exe winlogin.exe PID 1496 wrote to memory of 848 1496 cmd.exe winlogin.exe PID 1496 wrote to memory of 848 1496 cmd.exe winlogin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\41514a35b130af2ea475b0cb292166d671f684760febe933ed801f50bb456d88.exe"C:\Users\Admin\AppData\Local\Temp\41514a35b130af2ea475b0cb292166d671f684760febe933ed801f50bb456d88.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\cmd.execmd /D /R type "C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe" > ___ && move /Y ___ "C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe"2⤵PID:1344
-
C:\Windows\SysWOW64\cmd.execmd /D /R ping -n 10 localhost && del "C:\Users\Admin\AppData\Local\Temp\41514a35b130af2ea475b0cb292166d671f684760febe933ed801f50bb456d88.exe" && start /B "" "C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe" && exit2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost3⤵
- Runs ping.exe
PID:576 -
C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe"C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe"3⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
PID:848
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148B
MD570a7705b5b2b7dcbbd558e7e83345cf2
SHA1ca91cfe108ecc86432f754275d3dfc863de18acb
SHA2562acf164f58ee7b6ca82934d8264c570450da3da5d1058d464dad4161bf8f6e97
SHA5128ced98a325e63e7fed311d2c5d4c654680127edf61d8c5c77f4ddb4f0d7fcd4c3986feba2a139c673fc1632d9d95b4d447749243d4b8f913db5c491bd780d2b7
-
Filesize
164KB
MD509cb12d7cd0228360cd097baeaaa6552
SHA1c4d395545bfe7eb980e811bfeeed40f24b58f27a
SHA25641514a35b130af2ea475b0cb292166d671f684760febe933ed801f50bb456d88
SHA5127195d17421bbcc24e0f9521aa76a7edb527d9dce399d7e53a25ca6f334d522cab5b388aa0b9bc74f4586252f595860330ecb110c442894864f9f6eed5bc98851
-
Filesize
164KB
MD509cb12d7cd0228360cd097baeaaa6552
SHA1c4d395545bfe7eb980e811bfeeed40f24b58f27a
SHA25641514a35b130af2ea475b0cb292166d671f684760febe933ed801f50bb456d88
SHA5127195d17421bbcc24e0f9521aa76a7edb527d9dce399d7e53a25ca6f334d522cab5b388aa0b9bc74f4586252f595860330ecb110c442894864f9f6eed5bc98851
-
Filesize
164KB
MD509cb12d7cd0228360cd097baeaaa6552
SHA1c4d395545bfe7eb980e811bfeeed40f24b58f27a
SHA25641514a35b130af2ea475b0cb292166d671f684760febe933ed801f50bb456d88
SHA5127195d17421bbcc24e0f9521aa76a7edb527d9dce399d7e53a25ca6f334d522cab5b388aa0b9bc74f4586252f595860330ecb110c442894864f9f6eed5bc98851
-
Filesize
164KB
MD509cb12d7cd0228360cd097baeaaa6552
SHA1c4d395545bfe7eb980e811bfeeed40f24b58f27a
SHA25641514a35b130af2ea475b0cb292166d671f684760febe933ed801f50bb456d88
SHA5127195d17421bbcc24e0f9521aa76a7edb527d9dce399d7e53a25ca6f334d522cab5b388aa0b9bc74f4586252f595860330ecb110c442894864f9f6eed5bc98851