Analysis
-
max time kernel
184s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
24-11-2022 11:53
Static task
static1
Behavioral task
behavioral1
Sample
e7daacd1cfee0b8454ee1c79b031e3f9500c55a41742d4b697f2cea891b21e3b.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
e7daacd1cfee0b8454ee1c79b031e3f9500c55a41742d4b697f2cea891b21e3b.exe
Resource
win10v2004-20221111-en
General
-
Target
e7daacd1cfee0b8454ee1c79b031e3f9500c55a41742d4b697f2cea891b21e3b.exe
-
Size
230KB
-
MD5
559334a0652c9a9515646d53f162c74a
-
SHA1
af776b529d366b8ede32cdf89f6b6c9ee244cf4d
-
SHA256
e7daacd1cfee0b8454ee1c79b031e3f9500c55a41742d4b697f2cea891b21e3b
-
SHA512
3d75339c9d8beefc220dd9237195d2fd231325382c3864efe787aaf30b707096bfc2171a6f0ecb02c62de265d7d2556a2095b7ac835e4fc40b2295fa311abc2d
-
SSDEEP
3072:baSYvUVNpjftP8S4MDdfjKoskYWIqGrVbWHAQXEpQoRhqd9tsWtZbd+t0fqKi3Hu:bh9f5GSfEiTtsWTx0HHAQdZEe
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
winlogin.exepid process 1560 winlogin.exe -
Loads dropped DLL 1 IoCs
Processes:
e7daacd1cfee0b8454ee1c79b031e3f9500c55a41742d4b697f2cea891b21e3b.exepid process 960 e7daacd1cfee0b8454ee1c79b031e3f9500c55a41742d4b697f2cea891b21e3b.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
winlogin.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windows\\winlogin.exe\" -autorun" winlogin.exe Key created \REGISTRY\USER\S-1-5-21-575491160-2295418218-1540667289-1000\Software\Microsoft\Windows\CurrentVersion\Run winlogin.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
winlogin.exepid process 1560 winlogin.exe 1560 winlogin.exe 1560 winlogin.exe 1560 winlogin.exe 1560 winlogin.exe 1560 winlogin.exe 1560 winlogin.exe 1560 winlogin.exe 1560 winlogin.exe 1560 winlogin.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
e7daacd1cfee0b8454ee1c79b031e3f9500c55a41742d4b697f2cea891b21e3b.execmd.exewinlogin.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 960 wrote to memory of 568 960 e7daacd1cfee0b8454ee1c79b031e3f9500c55a41742d4b697f2cea891b21e3b.exe cmd.exe PID 960 wrote to memory of 568 960 e7daacd1cfee0b8454ee1c79b031e3f9500c55a41742d4b697f2cea891b21e3b.exe cmd.exe PID 960 wrote to memory of 568 960 e7daacd1cfee0b8454ee1c79b031e3f9500c55a41742d4b697f2cea891b21e3b.exe cmd.exe PID 960 wrote to memory of 568 960 e7daacd1cfee0b8454ee1c79b031e3f9500c55a41742d4b697f2cea891b21e3b.exe cmd.exe PID 568 wrote to memory of 1032 568 cmd.exe attrib.exe PID 568 wrote to memory of 1032 568 cmd.exe attrib.exe PID 568 wrote to memory of 1032 568 cmd.exe attrib.exe PID 568 wrote to memory of 1032 568 cmd.exe attrib.exe PID 960 wrote to memory of 1560 960 e7daacd1cfee0b8454ee1c79b031e3f9500c55a41742d4b697f2cea891b21e3b.exe winlogin.exe PID 960 wrote to memory of 1560 960 e7daacd1cfee0b8454ee1c79b031e3f9500c55a41742d4b697f2cea891b21e3b.exe winlogin.exe PID 960 wrote to memory of 1560 960 e7daacd1cfee0b8454ee1c79b031e3f9500c55a41742d4b697f2cea891b21e3b.exe winlogin.exe PID 960 wrote to memory of 1560 960 e7daacd1cfee0b8454ee1c79b031e3f9500c55a41742d4b697f2cea891b21e3b.exe winlogin.exe PID 1560 wrote to memory of 308 1560 winlogin.exe cmd.exe PID 1560 wrote to memory of 308 1560 winlogin.exe cmd.exe PID 1560 wrote to memory of 308 1560 winlogin.exe cmd.exe PID 1560 wrote to memory of 308 1560 winlogin.exe cmd.exe PID 308 wrote to memory of 1568 308 cmd.exe attrib.exe PID 308 wrote to memory of 1568 308 cmd.exe attrib.exe PID 308 wrote to memory of 1568 308 cmd.exe attrib.exe PID 308 wrote to memory of 1568 308 cmd.exe attrib.exe PID 1560 wrote to memory of 524 1560 winlogin.exe cmd.exe PID 1560 wrote to memory of 524 1560 winlogin.exe cmd.exe PID 1560 wrote to memory of 524 1560 winlogin.exe cmd.exe PID 1560 wrote to memory of 524 1560 winlogin.exe cmd.exe PID 524 wrote to memory of 1944 524 cmd.exe attrib.exe PID 524 wrote to memory of 1944 524 cmd.exe attrib.exe PID 524 wrote to memory of 1944 524 cmd.exe attrib.exe PID 524 wrote to memory of 1944 524 cmd.exe attrib.exe PID 1560 wrote to memory of 1436 1560 winlogin.exe cmd.exe PID 1560 wrote to memory of 1436 1560 winlogin.exe cmd.exe PID 1560 wrote to memory of 1436 1560 winlogin.exe cmd.exe PID 1560 wrote to memory of 1436 1560 winlogin.exe cmd.exe PID 1436 wrote to memory of 1172 1436 cmd.exe attrib.exe PID 1436 wrote to memory of 1172 1436 cmd.exe attrib.exe PID 1436 wrote to memory of 1172 1436 cmd.exe attrib.exe PID 1436 wrote to memory of 1172 1436 cmd.exe attrib.exe PID 1560 wrote to memory of 1764 1560 winlogin.exe cmd.exe PID 1560 wrote to memory of 1764 1560 winlogin.exe cmd.exe PID 1560 wrote to memory of 1764 1560 winlogin.exe cmd.exe PID 1560 wrote to memory of 1764 1560 winlogin.exe cmd.exe PID 1764 wrote to memory of 1884 1764 cmd.exe attrib.exe PID 1764 wrote to memory of 1884 1764 cmd.exe attrib.exe PID 1764 wrote to memory of 1884 1764 cmd.exe attrib.exe PID 1764 wrote to memory of 1884 1764 cmd.exe attrib.exe PID 1560 wrote to memory of 612 1560 winlogin.exe cmd.exe PID 1560 wrote to memory of 612 1560 winlogin.exe cmd.exe PID 1560 wrote to memory of 612 1560 winlogin.exe cmd.exe PID 1560 wrote to memory of 612 1560 winlogin.exe cmd.exe PID 612 wrote to memory of 1404 612 cmd.exe attrib.exe PID 612 wrote to memory of 1404 612 cmd.exe attrib.exe PID 612 wrote to memory of 1404 612 cmd.exe attrib.exe PID 612 wrote to memory of 1404 612 cmd.exe attrib.exe PID 1560 wrote to memory of 1380 1560 winlogin.exe cmd.exe PID 1560 wrote to memory of 1380 1560 winlogin.exe cmd.exe PID 1560 wrote to memory of 1380 1560 winlogin.exe cmd.exe PID 1560 wrote to memory of 1380 1560 winlogin.exe cmd.exe PID 1380 wrote to memory of 1728 1380 cmd.exe attrib.exe PID 1380 wrote to memory of 1728 1380 cmd.exe attrib.exe PID 1380 wrote to memory of 1728 1380 cmd.exe attrib.exe PID 1380 wrote to memory of 1728 1380 cmd.exe attrib.exe PID 1560 wrote to memory of 1292 1560 winlogin.exe cmd.exe PID 1560 wrote to memory of 1292 1560 winlogin.exe cmd.exe PID 1560 wrote to memory of 1292 1560 winlogin.exe cmd.exe PID 1560 wrote to memory of 1292 1560 winlogin.exe cmd.exe -
Views/modifies file attributes 1 TTPs 9 IoCs
Processes:
attrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exeattrib.exepid process 1884 attrib.exe 1728 attrib.exe 1392 attrib.exe 1568 attrib.exe 1944 attrib.exe 1172 attrib.exe 1032 attrib.exe 1404 attrib.exe 1340 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7daacd1cfee0b8454ee1c79b031e3f9500c55a41742d4b697f2cea891b21e3b.exe"C:\Users\Admin\AppData\Local\Temp\e7daacd1cfee0b8454ee1c79b031e3f9500c55a41742d4b697f2cea891b21e3b.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib +h "C:\Users\Admin\AppData\Local\Temp\e7daacd1cfee0b8454ee1c79b031e3f9500c55a41742d4b697f2cea891b21e3b.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Users\Admin\AppData\Local\Temp\e7daacd1cfee0b8454ee1c79b031e3f9500c55a41742d4b697f2cea891b21e3b.exe"3⤵
- Views/modifies file attributes
PID:1032 -
C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe"C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib +h "C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe"4⤵
- Views/modifies file attributes
PID:1568 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib +h "C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe"4⤵
- Views/modifies file attributes
PID:1944 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib +h "C:\Users\Admin\AppData\Roaming\Windows\config.ini"3⤵
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Users\Admin\AppData\Roaming\Windows\config.ini"4⤵
- Views/modifies file attributes
PID:1172 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib +h "C:\Users\Admin\AppData\Roaming\Windows\cfg"3⤵
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Users\Admin\AppData\Roaming\Windows\cfg"4⤵
- Views/modifies file attributes
PID:1884 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib +h "."3⤵
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Windows\SysWOW64\attrib.exeattrib +h "."4⤵
- Views/modifies file attributes
PID:1404 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib +h ".."3⤵
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\attrib.exeattrib +h ".."4⤵
- Views/modifies file attributes
PID:1728 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib +h "config.ini"3⤵PID:1292
-
C:\Windows\SysWOW64\attrib.exeattrib +h "config.ini"4⤵
- Views/modifies file attributes
PID:1392 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib +h "winlogin.exe"3⤵PID:1148
-
C:\Windows\SysWOW64\attrib.exeattrib +h "winlogin.exe"4⤵
- Views/modifies file attributes
PID:1340
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23B
MD53686ce48884a1cfe6d8baf44e718983e
SHA1ec7cac48f16c7123435570a99226c5bbe42f9d61
SHA2569dad5b913773a0736ff50ea369c59d616b123dd284d7b3399f20920229a6e9a2
SHA512b256487c217c698d2bef6fd389b399fe88b5d91e08bbf2467c92e08468f9f63419adfb6c28157a9309a952fb75c01b6621ba85318b1a3b692ffe24931f129528
-
Filesize
230KB
MD5559334a0652c9a9515646d53f162c74a
SHA1af776b529d366b8ede32cdf89f6b6c9ee244cf4d
SHA256e7daacd1cfee0b8454ee1c79b031e3f9500c55a41742d4b697f2cea891b21e3b
SHA5123d75339c9d8beefc220dd9237195d2fd231325382c3864efe787aaf30b707096bfc2171a6f0ecb02c62de265d7d2556a2095b7ac835e4fc40b2295fa311abc2d
-
Filesize
230KB
MD5559334a0652c9a9515646d53f162c74a
SHA1af776b529d366b8ede32cdf89f6b6c9ee244cf4d
SHA256e7daacd1cfee0b8454ee1c79b031e3f9500c55a41742d4b697f2cea891b21e3b
SHA5123d75339c9d8beefc220dd9237195d2fd231325382c3864efe787aaf30b707096bfc2171a6f0ecb02c62de265d7d2556a2095b7ac835e4fc40b2295fa311abc2d
-
Filesize
230KB
MD5559334a0652c9a9515646d53f162c74a
SHA1af776b529d366b8ede32cdf89f6b6c9ee244cf4d
SHA256e7daacd1cfee0b8454ee1c79b031e3f9500c55a41742d4b697f2cea891b21e3b
SHA5123d75339c9d8beefc220dd9237195d2fd231325382c3864efe787aaf30b707096bfc2171a6f0ecb02c62de265d7d2556a2095b7ac835e4fc40b2295fa311abc2d