Analysis
-
max time kernel
110s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 10:18
Static task
static1
Behavioral task
behavioral1
Sample
fax20141311.scr
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fax20141311.scr
Resource
win10v2004-20221111-en
General
-
Target
fax20141311.scr
-
Size
152KB
-
MD5
5a9cf95f1bcbfab27697320d37a285fa
-
SHA1
bf3a1663e883a6cd5c6841b33560d82cf981760a
-
SHA256
d3a0814c13c1b5e4284dde67f3587f2dcd29f79dc321684ad8453fc7cd0c88d7
-
SHA512
156a7701aca6ebd2537927621916009f968a9a7602738b246e40a2fffd8132846de464c811fd8e29185a6e18deb22d8af4aa2231ca38cf07e94717bcc263bece
-
SSDEEP
3072:T0myVXzL23pim8Y4U0Ag0FugZmTWAkzQk1T8qrgp:wmWXzS3pim8Yr0AOAaXkD
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
winlogin.exepid process 320 winlogin.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
winlogin.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Active Setup\Installed Components\05F16C88-71D3-42C1-BB4F-E9BAF7DB4A9E\cfg = "{EFEAF763-C00C-485D-8DDC-E59EE50AD382}SERV }SABDUHNY " winlogin.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Active Setup\Installed Components\05F16C88-71D3-42C1-BB4F-E9BAF7DB4A9E winlogin.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 884 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 884 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
winlogin.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run winlogin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winlogin = "C:\\Users\\Admin\\AppData\\Roaming\\Windows\\winlogin.exe" winlogin.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org 5 api.ipify.org 6 api.ipify.org -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
fax20141311.scrcmd.exedescription pid process target process PID 1052 wrote to memory of 1716 1052 fax20141311.scr cmd.exe PID 1052 wrote to memory of 1716 1052 fax20141311.scr cmd.exe PID 1052 wrote to memory of 1716 1052 fax20141311.scr cmd.exe PID 1052 wrote to memory of 1716 1052 fax20141311.scr cmd.exe PID 1052 wrote to memory of 884 1052 fax20141311.scr cmd.exe PID 1052 wrote to memory of 884 1052 fax20141311.scr cmd.exe PID 1052 wrote to memory of 884 1052 fax20141311.scr cmd.exe PID 1052 wrote to memory of 884 1052 fax20141311.scr cmd.exe PID 884 wrote to memory of 1744 884 cmd.exe PING.EXE PID 884 wrote to memory of 1744 884 cmd.exe PING.EXE PID 884 wrote to memory of 1744 884 cmd.exe PING.EXE PID 884 wrote to memory of 1744 884 cmd.exe PING.EXE PID 884 wrote to memory of 320 884 cmd.exe winlogin.exe PID 884 wrote to memory of 320 884 cmd.exe winlogin.exe PID 884 wrote to memory of 320 884 cmd.exe winlogin.exe PID 884 wrote to memory of 320 884 cmd.exe winlogin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fax20141311.scr"C:\Users\Admin\AppData\Local\Temp\fax20141311.scr" /S1⤵
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\SysWOW64\cmd.execmd /D /R type "C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe" > ___ && move /Y ___ "C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe"2⤵PID:1716
-
C:\Windows\SysWOW64\cmd.execmd /D /R ping -n 10 localhost && del "C:\Users\Admin\AppData\Local\Temp\fax20141311.scr" && start /B "" "C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe" && exit2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost3⤵
- Runs ping.exe
PID:1744 -
C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe"C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe"3⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
PID:320
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152KB
MD55a9cf95f1bcbfab27697320d37a285fa
SHA1bf3a1663e883a6cd5c6841b33560d82cf981760a
SHA256d3a0814c13c1b5e4284dde67f3587f2dcd29f79dc321684ad8453fc7cd0c88d7
SHA512156a7701aca6ebd2537927621916009f968a9a7602738b246e40a2fffd8132846de464c811fd8e29185a6e18deb22d8af4aa2231ca38cf07e94717bcc263bece
-
Filesize
152KB
MD55a9cf95f1bcbfab27697320d37a285fa
SHA1bf3a1663e883a6cd5c6841b33560d82cf981760a
SHA256d3a0814c13c1b5e4284dde67f3587f2dcd29f79dc321684ad8453fc7cd0c88d7
SHA512156a7701aca6ebd2537927621916009f968a9a7602738b246e40a2fffd8132846de464c811fd8e29185a6e18deb22d8af4aa2231ca38cf07e94717bcc263bece
-
Filesize
152KB
MD55a9cf95f1bcbfab27697320d37a285fa
SHA1bf3a1663e883a6cd5c6841b33560d82cf981760a
SHA256d3a0814c13c1b5e4284dde67f3587f2dcd29f79dc321684ad8453fc7cd0c88d7
SHA512156a7701aca6ebd2537927621916009f968a9a7602738b246e40a2fffd8132846de464c811fd8e29185a6e18deb22d8af4aa2231ca38cf07e94717bcc263bece
-
Filesize
152KB
MD55a9cf95f1bcbfab27697320d37a285fa
SHA1bf3a1663e883a6cd5c6841b33560d82cf981760a
SHA256d3a0814c13c1b5e4284dde67f3587f2dcd29f79dc321684ad8453fc7cd0c88d7
SHA512156a7701aca6ebd2537927621916009f968a9a7602738b246e40a2fffd8132846de464c811fd8e29185a6e18deb22d8af4aa2231ca38cf07e94717bcc263bece