Analysis

  • max time kernel
    91s
  • max time network
    94s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 09:21

General

  • Target

    41514a35b130af2ea475b0cb292166d671f684760febe933ed801f50bb456d88.exe

  • Size

    164KB

  • MD5

    09cb12d7cd0228360cd097baeaaa6552

  • SHA1

    c4d395545bfe7eb980e811bfeeed40f24b58f27a

  • SHA256

    41514a35b130af2ea475b0cb292166d671f684760febe933ed801f50bb456d88

  • SHA512

    7195d17421bbcc24e0f9521aa76a7edb527d9dce399d7e53a25ca6f334d522cab5b388aa0b9bc74f4586252f595860330ecb110c442894864f9f6eed5bc98851

  • SSDEEP

    3072:v/obD3KFdIbdHqhwBrzmRp8Z/WPGaY7XmlXN2/9uaGXl1wiK4hc0NHg5Jw:v8D3KERHqJCZ+A7XmJmua4whigg

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41514a35b130af2ea475b0cb292166d671f684760febe933ed801f50bb456d88.exe
    "C:\Users\Admin\AppData\Local\Temp\41514a35b130af2ea475b0cb292166d671f684760febe933ed801f50bb456d88.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:960
    • C:\Windows\SysWOW64\cmd.exe
      cmd /D /R type "C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe" > ___ && move /Y ___ "C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe"
      2⤵
        PID:1344
      • C:\Windows\SysWOW64\cmd.exe
        cmd /D /R ping -n 10 localhost && del "C:\Users\Admin\AppData\Local\Temp\41514a35b130af2ea475b0cb292166d671f684760febe933ed801f50bb456d88.exe" && start /B "" "C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe" && exit
        2⤵
        • Deletes itself
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1496
        • C:\Windows\SysWOW64\PING.EXE
          ping -n 10 localhost
          3⤵
          • Runs ping.exe
          PID:576
        • C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe
          "C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe"
          3⤵
          • Executes dropped EXE
          • Modifies Installed Components in the registry
          • Adds Run key to start application
          PID:848

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\1

      Filesize

      148B

      MD5

      70a7705b5b2b7dcbbd558e7e83345cf2

      SHA1

      ca91cfe108ecc86432f754275d3dfc863de18acb

      SHA256

      2acf164f58ee7b6ca82934d8264c570450da3da5d1058d464dad4161bf8f6e97

      SHA512

      8ced98a325e63e7fed311d2c5d4c654680127edf61d8c5c77f4ddb4f0d7fcd4c3986feba2a139c673fc1632d9d95b4d447749243d4b8f913db5c491bd780d2b7

    • C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe

      Filesize

      164KB

      MD5

      09cb12d7cd0228360cd097baeaaa6552

      SHA1

      c4d395545bfe7eb980e811bfeeed40f24b58f27a

      SHA256

      41514a35b130af2ea475b0cb292166d671f684760febe933ed801f50bb456d88

      SHA512

      7195d17421bbcc24e0f9521aa76a7edb527d9dce399d7e53a25ca6f334d522cab5b388aa0b9bc74f4586252f595860330ecb110c442894864f9f6eed5bc98851

    • C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe

      Filesize

      164KB

      MD5

      09cb12d7cd0228360cd097baeaaa6552

      SHA1

      c4d395545bfe7eb980e811bfeeed40f24b58f27a

      SHA256

      41514a35b130af2ea475b0cb292166d671f684760febe933ed801f50bb456d88

      SHA512

      7195d17421bbcc24e0f9521aa76a7edb527d9dce399d7e53a25ca6f334d522cab5b388aa0b9bc74f4586252f595860330ecb110c442894864f9f6eed5bc98851

    • C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe

      Filesize

      164KB

      MD5

      09cb12d7cd0228360cd097baeaaa6552

      SHA1

      c4d395545bfe7eb980e811bfeeed40f24b58f27a

      SHA256

      41514a35b130af2ea475b0cb292166d671f684760febe933ed801f50bb456d88

      SHA512

      7195d17421bbcc24e0f9521aa76a7edb527d9dce399d7e53a25ca6f334d522cab5b388aa0b9bc74f4586252f595860330ecb110c442894864f9f6eed5bc98851

    • \Users\Admin\AppData\Roaming\Windows\winlogin.exe

      Filesize

      164KB

      MD5

      09cb12d7cd0228360cd097baeaaa6552

      SHA1

      c4d395545bfe7eb980e811bfeeed40f24b58f27a

      SHA256

      41514a35b130af2ea475b0cb292166d671f684760febe933ed801f50bb456d88

      SHA512

      7195d17421bbcc24e0f9521aa76a7edb527d9dce399d7e53a25ca6f334d522cab5b388aa0b9bc74f4586252f595860330ecb110c442894864f9f6eed5bc98851

    • memory/576-60-0x0000000000000000-mapping.dmp

    • memory/848-63-0x0000000000000000-mapping.dmp

    • memory/848-67-0x00000000024C0000-0x000000000258A000-memory.dmp

      Filesize

      808KB

    • memory/848-68-0x00000000024C0000-0x000000000258A000-memory.dmp

      Filesize

      808KB

    • memory/960-54-0x00000000757A1000-0x00000000757A3000-memory.dmp

      Filesize

      8KB

    • memory/960-58-0x0000000002350000-0x0000000002546000-memory.dmp

      Filesize

      2.0MB

    • memory/960-55-0x0000000002350000-0x0000000002546000-memory.dmp

      Filesize

      2.0MB

    • memory/1344-56-0x0000000000000000-mapping.dmp

    • memory/1496-59-0x0000000000000000-mapping.dmp