Analysis

  • max time kernel
    168s
  • max time network
    192s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 19:30

General

  • Target

    5cfbc395d95347350e85fafb3d15e811350b18dce1e2abfe981ed59449c5ecdd.exe

  • Size

    219KB

  • MD5

    d9fc38c11b88c277922a1af48cdaebf6

  • SHA1

    12630cf78f29e2c81a3b757cbc48b95793f05301

  • SHA256

    5cfbc395d95347350e85fafb3d15e811350b18dce1e2abfe981ed59449c5ecdd

  • SHA512

    a9d4a93a8546eda7003ec45ec903e01701e457aeefa6d0fd9ce6a9d4638f05d4e5fe76fd40c3b070a6d513cb817a4344574bb78c26ece80efe6ee1ed9b0d8b6a

  • SSDEEP

    6144:oAI9wC8bgvTAPGAAGWd1AOeo+m1D/cY8VDfy0:oABDgvTA+AAGWd14zm5/cYeq0

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5cfbc395d95347350e85fafb3d15e811350b18dce1e2abfe981ed59449c5ecdd.exe
    "C:\Users\Admin\AppData\Local\Temp\5cfbc395d95347350e85fafb3d15e811350b18dce1e2abfe981ed59449c5ecdd.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4496
    • C:\Windows\SysWOW64\cmd.exe
      cmd /D /R type "C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe" > ___ && move /Y ___ "C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe"
      2⤵
        PID:5108
      • C:\Windows\SysWOW64\cmd.exe
        cmd /D /R ping -n 10 localhost && del "C:\Users\Admin\AppData\Local\Temp\5cfbc395d95347350e85fafb3d15e811350b18dce1e2abfe981ed59449c5ecdd.exe" && start /B "" "C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe" && exit
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:5004
        • C:\Windows\SysWOW64\PING.EXE
          ping -n 10 localhost
          3⤵
          • Runs ping.exe
          PID:4532
        • C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe
          "C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe"
          3⤵
          • Executes dropped EXE
          • Modifies Installed Components in the registry
          • Adds Run key to start application
          • Modifies system certificate store
          PID:2328

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe
      Filesize

      219KB

      MD5

      d9fc38c11b88c277922a1af48cdaebf6

      SHA1

      12630cf78f29e2c81a3b757cbc48b95793f05301

      SHA256

      5cfbc395d95347350e85fafb3d15e811350b18dce1e2abfe981ed59449c5ecdd

      SHA512

      a9d4a93a8546eda7003ec45ec903e01701e457aeefa6d0fd9ce6a9d4638f05d4e5fe76fd40c3b070a6d513cb817a4344574bb78c26ece80efe6ee1ed9b0d8b6a

    • C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe
      Filesize

      219KB

      MD5

      d9fc38c11b88c277922a1af48cdaebf6

      SHA1

      12630cf78f29e2c81a3b757cbc48b95793f05301

      SHA256

      5cfbc395d95347350e85fafb3d15e811350b18dce1e2abfe981ed59449c5ecdd

      SHA512

      a9d4a93a8546eda7003ec45ec903e01701e457aeefa6d0fd9ce6a9d4638f05d4e5fe76fd40c3b070a6d513cb817a4344574bb78c26ece80efe6ee1ed9b0d8b6a

    • C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe
      Filesize

      219KB

      MD5

      d9fc38c11b88c277922a1af48cdaebf6

      SHA1

      12630cf78f29e2c81a3b757cbc48b95793f05301

      SHA256

      5cfbc395d95347350e85fafb3d15e811350b18dce1e2abfe981ed59449c5ecdd

      SHA512

      a9d4a93a8546eda7003ec45ec903e01701e457aeefa6d0fd9ce6a9d4638f05d4e5fe76fd40c3b070a6d513cb817a4344574bb78c26ece80efe6ee1ed9b0d8b6a

    • memory/2328-138-0x0000000000000000-mapping.dmp
    • memory/2328-141-0x0000000002590000-0x00000000026B5000-memory.dmp
      Filesize

      1.1MB

    • memory/4496-132-0x0000000002760000-0x0000000002885000-memory.dmp
      Filesize

      1.1MB

    • memory/4496-133-0x0000000002760000-0x0000000002885000-memory.dmp
      Filesize

      1.1MB

    • memory/4532-137-0x0000000000000000-mapping.dmp
    • memory/5004-136-0x0000000000000000-mapping.dmp
    • memory/5108-134-0x0000000000000000-mapping.dmp