Analysis
-
max time kernel
127s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
26-11-2022 09:00
Static task
static1
Behavioral task
behavioral1
Sample
1522baa8a9bd62d6ab087f8d3129315ac97e2f715bcd4c06db32306de7b65eca.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1522baa8a9bd62d6ab087f8d3129315ac97e2f715bcd4c06db32306de7b65eca.exe
Resource
win10v2004-20221111-en
General
-
Target
1522baa8a9bd62d6ab087f8d3129315ac97e2f715bcd4c06db32306de7b65eca.exe
-
Size
104KB
-
MD5
17f4394a5540e69a79b3c8cff3e1f225
-
SHA1
124cad1d2027c0a5c8a7fe2f9f5b6e9f03e712b5
-
SHA256
1522baa8a9bd62d6ab087f8d3129315ac97e2f715bcd4c06db32306de7b65eca
-
SHA512
6971bef0f4cbaf9601f485862ec60933fb5af33b8ccebe3308a538a1d1b75b697d9511a0d96bfba1979a43f2f3e3ab9dfcf1d9f75e1df9244c6649a2e1a9f668
-
SSDEEP
1536:L9UJfvpSmtj9yMV4x2NJ3Skf8G0pQxcmVzDijMWEx6JQR6KKNWzA0n:LmvpSmXyWNn8G0p4cm9DwMWEx0a5
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
winlogin.exepid process 1692 winlogin.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
winlogin.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Active Setup\Installed Components\05F16C88-71D3-42C1-BB4F-E9BAF7DB4A9E winlogin.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Active Setup\Installed Components\05F16C88-71D3-42C1-BB4F-E9BAF7DB4A9E\cfg = "{F27A70DD-3677-40DA-BF0A-D85D327ED5A6}SERV }VUIIVLGQ " winlogin.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 724 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 724 cmd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
winlogin.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\Run winlogin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winlogin = "C:\\Users\\Admin\\AppData\\Roaming\\Windows\\winlogin.exe" winlogin.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org 5 api.ipify.org 6 api.ipify.org -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
1522baa8a9bd62d6ab087f8d3129315ac97e2f715bcd4c06db32306de7b65eca.execmd.exedescription pid process target process PID 1256 wrote to memory of 2012 1256 1522baa8a9bd62d6ab087f8d3129315ac97e2f715bcd4c06db32306de7b65eca.exe cmd.exe PID 1256 wrote to memory of 2012 1256 1522baa8a9bd62d6ab087f8d3129315ac97e2f715bcd4c06db32306de7b65eca.exe cmd.exe PID 1256 wrote to memory of 2012 1256 1522baa8a9bd62d6ab087f8d3129315ac97e2f715bcd4c06db32306de7b65eca.exe cmd.exe PID 1256 wrote to memory of 2012 1256 1522baa8a9bd62d6ab087f8d3129315ac97e2f715bcd4c06db32306de7b65eca.exe cmd.exe PID 1256 wrote to memory of 724 1256 1522baa8a9bd62d6ab087f8d3129315ac97e2f715bcd4c06db32306de7b65eca.exe cmd.exe PID 1256 wrote to memory of 724 1256 1522baa8a9bd62d6ab087f8d3129315ac97e2f715bcd4c06db32306de7b65eca.exe cmd.exe PID 1256 wrote to memory of 724 1256 1522baa8a9bd62d6ab087f8d3129315ac97e2f715bcd4c06db32306de7b65eca.exe cmd.exe PID 1256 wrote to memory of 724 1256 1522baa8a9bd62d6ab087f8d3129315ac97e2f715bcd4c06db32306de7b65eca.exe cmd.exe PID 724 wrote to memory of 568 724 cmd.exe PING.EXE PID 724 wrote to memory of 568 724 cmd.exe PING.EXE PID 724 wrote to memory of 568 724 cmd.exe PING.EXE PID 724 wrote to memory of 568 724 cmd.exe PING.EXE PID 724 wrote to memory of 1692 724 cmd.exe winlogin.exe PID 724 wrote to memory of 1692 724 cmd.exe winlogin.exe PID 724 wrote to memory of 1692 724 cmd.exe winlogin.exe PID 724 wrote to memory of 1692 724 cmd.exe winlogin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1522baa8a9bd62d6ab087f8d3129315ac97e2f715bcd4c06db32306de7b65eca.exe"C:\Users\Admin\AppData\Local\Temp\1522baa8a9bd62d6ab087f8d3129315ac97e2f715bcd4c06db32306de7b65eca.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\cmd.execmd /D /R type "C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe" > ___ && move /Y ___ "C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe"2⤵PID:2012
-
-
C:\Windows\SysWOW64\cmd.execmd /D /R ping -n 10 localhost && del "C:\Users\Admin\AppData\Local\Temp\1522baa8a9bd62d6ab087f8d3129315ac97e2f715bcd4c06db32306de7b65eca.exe" && start /B "" "C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe" && exit2⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost3⤵
- Runs ping.exe
PID:568
-
-
C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe"C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe"3⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
PID:1692
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3406023954-474543476-3319432036-1000\3310a4fa6cb9c60504498d7eea986fc2_5a633035-f6f6-46e5-abe0-a504cf633ef0
Filesize50B
MD545218adff3ea5bde8a8f61987f0f458b
SHA1cf7fffa410795cc2f7703755f0acd17b51a44ad7
SHA256f95361b82464704675f559b13c007c9567e5914984042f537122383e747194d4
SHA5128442cac48931075ec5bd31ea82faffc4f64d7b6845d5c477d06fc3d7eefeac1fa366b6880a85709a520a343b5dd3771e69bc4b7482cde50e69e04215927a2018
-
Filesize
104KB
MD517f4394a5540e69a79b3c8cff3e1f225
SHA1124cad1d2027c0a5c8a7fe2f9f5b6e9f03e712b5
SHA2561522baa8a9bd62d6ab087f8d3129315ac97e2f715bcd4c06db32306de7b65eca
SHA5126971bef0f4cbaf9601f485862ec60933fb5af33b8ccebe3308a538a1d1b75b697d9511a0d96bfba1979a43f2f3e3ab9dfcf1d9f75e1df9244c6649a2e1a9f668
-
Filesize
104KB
MD517f4394a5540e69a79b3c8cff3e1f225
SHA1124cad1d2027c0a5c8a7fe2f9f5b6e9f03e712b5
SHA2561522baa8a9bd62d6ab087f8d3129315ac97e2f715bcd4c06db32306de7b65eca
SHA5126971bef0f4cbaf9601f485862ec60933fb5af33b8ccebe3308a538a1d1b75b697d9511a0d96bfba1979a43f2f3e3ab9dfcf1d9f75e1df9244c6649a2e1a9f668
-
Filesize
104KB
MD517f4394a5540e69a79b3c8cff3e1f225
SHA1124cad1d2027c0a5c8a7fe2f9f5b6e9f03e712b5
SHA2561522baa8a9bd62d6ab087f8d3129315ac97e2f715bcd4c06db32306de7b65eca
SHA5126971bef0f4cbaf9601f485862ec60933fb5af33b8ccebe3308a538a1d1b75b697d9511a0d96bfba1979a43f2f3e3ab9dfcf1d9f75e1df9244c6649a2e1a9f668
-
Filesize
104KB
MD517f4394a5540e69a79b3c8cff3e1f225
SHA1124cad1d2027c0a5c8a7fe2f9f5b6e9f03e712b5
SHA2561522baa8a9bd62d6ab087f8d3129315ac97e2f715bcd4c06db32306de7b65eca
SHA5126971bef0f4cbaf9601f485862ec60933fb5af33b8ccebe3308a538a1d1b75b697d9511a0d96bfba1979a43f2f3e3ab9dfcf1d9f75e1df9244c6649a2e1a9f668