Analysis

  • max time kernel
    127s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2022 09:00

General

  • Target

    1522baa8a9bd62d6ab087f8d3129315ac97e2f715bcd4c06db32306de7b65eca.exe

  • Size

    104KB

  • MD5

    17f4394a5540e69a79b3c8cff3e1f225

  • SHA1

    124cad1d2027c0a5c8a7fe2f9f5b6e9f03e712b5

  • SHA256

    1522baa8a9bd62d6ab087f8d3129315ac97e2f715bcd4c06db32306de7b65eca

  • SHA512

    6971bef0f4cbaf9601f485862ec60933fb5af33b8ccebe3308a538a1d1b75b697d9511a0d96bfba1979a43f2f3e3ab9dfcf1d9f75e1df9244c6649a2e1a9f668

  • SSDEEP

    1536:L9UJfvpSmtj9yMV4x2NJ3Skf8G0pQxcmVzDijMWEx6JQR6KKNWzA0n:LmvpSmXyWNn8G0p4cm9DwMWEx0a5

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1522baa8a9bd62d6ab087f8d3129315ac97e2f715bcd4c06db32306de7b65eca.exe
    "C:\Users\Admin\AppData\Local\Temp\1522baa8a9bd62d6ab087f8d3129315ac97e2f715bcd4c06db32306de7b65eca.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1256
    • C:\Windows\SysWOW64\cmd.exe
      cmd /D /R type "C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe" > ___ && move /Y ___ "C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe"
      2⤵
        PID:2012
      • C:\Windows\SysWOW64\cmd.exe
        cmd /D /R ping -n 10 localhost && del "C:\Users\Admin\AppData\Local\Temp\1522baa8a9bd62d6ab087f8d3129315ac97e2f715bcd4c06db32306de7b65eca.exe" && start /B "" "C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe" && exit
        2⤵
        • Deletes itself
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:724
        • C:\Windows\SysWOW64\PING.EXE
          ping -n 10 localhost
          3⤵
          • Runs ping.exe
          PID:568
        • C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe
          "C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe"
          3⤵
          • Executes dropped EXE
          • Modifies Installed Components in the registry
          • Adds Run key to start application
          PID:1692

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3406023954-474543476-3319432036-1000\3310a4fa6cb9c60504498d7eea986fc2_5a633035-f6f6-46e5-abe0-a504cf633ef0

      Filesize

      50B

      MD5

      45218adff3ea5bde8a8f61987f0f458b

      SHA1

      cf7fffa410795cc2f7703755f0acd17b51a44ad7

      SHA256

      f95361b82464704675f559b13c007c9567e5914984042f537122383e747194d4

      SHA512

      8442cac48931075ec5bd31ea82faffc4f64d7b6845d5c477d06fc3d7eefeac1fa366b6880a85709a520a343b5dd3771e69bc4b7482cde50e69e04215927a2018

    • C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe

      Filesize

      104KB

      MD5

      17f4394a5540e69a79b3c8cff3e1f225

      SHA1

      124cad1d2027c0a5c8a7fe2f9f5b6e9f03e712b5

      SHA256

      1522baa8a9bd62d6ab087f8d3129315ac97e2f715bcd4c06db32306de7b65eca

      SHA512

      6971bef0f4cbaf9601f485862ec60933fb5af33b8ccebe3308a538a1d1b75b697d9511a0d96bfba1979a43f2f3e3ab9dfcf1d9f75e1df9244c6649a2e1a9f668

    • C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe

      Filesize

      104KB

      MD5

      17f4394a5540e69a79b3c8cff3e1f225

      SHA1

      124cad1d2027c0a5c8a7fe2f9f5b6e9f03e712b5

      SHA256

      1522baa8a9bd62d6ab087f8d3129315ac97e2f715bcd4c06db32306de7b65eca

      SHA512

      6971bef0f4cbaf9601f485862ec60933fb5af33b8ccebe3308a538a1d1b75b697d9511a0d96bfba1979a43f2f3e3ab9dfcf1d9f75e1df9244c6649a2e1a9f668

    • C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe

      Filesize

      104KB

      MD5

      17f4394a5540e69a79b3c8cff3e1f225

      SHA1

      124cad1d2027c0a5c8a7fe2f9f5b6e9f03e712b5

      SHA256

      1522baa8a9bd62d6ab087f8d3129315ac97e2f715bcd4c06db32306de7b65eca

      SHA512

      6971bef0f4cbaf9601f485862ec60933fb5af33b8ccebe3308a538a1d1b75b697d9511a0d96bfba1979a43f2f3e3ab9dfcf1d9f75e1df9244c6649a2e1a9f668

    • \Users\Admin\AppData\Roaming\Windows\winlogin.exe

      Filesize

      104KB

      MD5

      17f4394a5540e69a79b3c8cff3e1f225

      SHA1

      124cad1d2027c0a5c8a7fe2f9f5b6e9f03e712b5

      SHA256

      1522baa8a9bd62d6ab087f8d3129315ac97e2f715bcd4c06db32306de7b65eca

      SHA512

      6971bef0f4cbaf9601f485862ec60933fb5af33b8ccebe3308a538a1d1b75b697d9511a0d96bfba1979a43f2f3e3ab9dfcf1d9f75e1df9244c6649a2e1a9f668

    • memory/568-58-0x0000000000000000-mapping.dmp

    • memory/724-57-0x0000000000000000-mapping.dmp

    • memory/1256-54-0x0000000002080000-0x00000000021B7000-memory.dmp

      Filesize

      1.2MB

    • memory/1692-61-0x0000000000000000-mapping.dmp

    • memory/1692-64-0x0000000076531000-0x0000000076533000-memory.dmp

      Filesize

      8KB

    • memory/1692-65-0x00000000021D0000-0x0000000002307000-memory.dmp

      Filesize

      1.2MB

    • memory/2012-55-0x0000000000000000-mapping.dmp