Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 07:25
Static task
static1
Behavioral task
behavioral1
Sample
8be655497ded041cc896788e543e5dad24a5dea518f9d869e376948b004c2e71.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8be655497ded041cc896788e543e5dad24a5dea518f9d869e376948b004c2e71.exe
Resource
win10v2004-20220812-en
General
-
Target
8be655497ded041cc896788e543e5dad24a5dea518f9d869e376948b004c2e71.exe
-
Size
103KB
-
MD5
af492f4985b1486f035a2199086921c3
-
SHA1
748a4865c24eb3c0e21a5b9e6e32a8f9ac2130f0
-
SHA256
8be655497ded041cc896788e543e5dad24a5dea518f9d869e376948b004c2e71
-
SHA512
7cb35416aa9e537438158acba7b2bbd9685466800bcfe99429b90e26d80eae598f89c3d8728118aa08e93cf372b0f8bf0c7e5249b695dee7d41506cfd161088a
-
SSDEEP
3072:DWw/LXWDZ+DxBNb1SpuxJqQRmxrXbLWGO:DWw/DW5uaQRQfY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1600 winlogin.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\05F16C88-71D3-42C1-BB4F-E9BAF7DB4A9E\cfg = "{2DB91C84-8AB8-4735-A51D-D8500F018273}GR }TMKNGOMU " winlogin.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Active Setup\Installed Components\05F16C88-71D3-42C1-BB4F-E9BAF7DB4A9E winlogin.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run winlogin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\winlogin = "C:\\Users\\Admin\\AppData\\Roaming\\Windows\\winlogin.exe" winlogin.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 28 api.ipify.org 37 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 5096 PING.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4988 wrote to memory of 1896 4988 8be655497ded041cc896788e543e5dad24a5dea518f9d869e376948b004c2e71.exe 79 PID 4988 wrote to memory of 1896 4988 8be655497ded041cc896788e543e5dad24a5dea518f9d869e376948b004c2e71.exe 79 PID 4988 wrote to memory of 1896 4988 8be655497ded041cc896788e543e5dad24a5dea518f9d869e376948b004c2e71.exe 79 PID 4988 wrote to memory of 5064 4988 8be655497ded041cc896788e543e5dad24a5dea518f9d869e376948b004c2e71.exe 81 PID 4988 wrote to memory of 5064 4988 8be655497ded041cc896788e543e5dad24a5dea518f9d869e376948b004c2e71.exe 81 PID 4988 wrote to memory of 5064 4988 8be655497ded041cc896788e543e5dad24a5dea518f9d869e376948b004c2e71.exe 81 PID 5064 wrote to memory of 5096 5064 cmd.exe 83 PID 5064 wrote to memory of 5096 5064 cmd.exe 83 PID 5064 wrote to memory of 5096 5064 cmd.exe 83 PID 5064 wrote to memory of 1600 5064 cmd.exe 85 PID 5064 wrote to memory of 1600 5064 cmd.exe 85 PID 5064 wrote to memory of 1600 5064 cmd.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\8be655497ded041cc896788e543e5dad24a5dea518f9d869e376948b004c2e71.exe"C:\Users\Admin\AppData\Local\Temp\8be655497ded041cc896788e543e5dad24a5dea518f9d869e376948b004c2e71.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\cmd.execmd /D /R type "C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe" > ___ && move /Y ___ "C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe"2⤵PID:1896
-
-
C:\Windows\SysWOW64\cmd.execmd /D /R ping -n 10 localhost && del "C:\Users\Admin\AppData\Local\Temp\8be655497ded041cc896788e543e5dad24a5dea518f9d869e376948b004c2e71.exe" && start /B "" "C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe" && exit2⤵
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\PING.EXEping -n 10 localhost3⤵
- Runs ping.exe
PID:5096
-
-
C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe"C:\Users\Admin\AppData\Roaming\Windows\winlogin.exe"3⤵
- Executes dropped EXE
- Modifies Installed Components in the registry
- Adds Run key to start application
PID:1600
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
103KB
MD5af492f4985b1486f035a2199086921c3
SHA1748a4865c24eb3c0e21a5b9e6e32a8f9ac2130f0
SHA2568be655497ded041cc896788e543e5dad24a5dea518f9d869e376948b004c2e71
SHA5127cb35416aa9e537438158acba7b2bbd9685466800bcfe99429b90e26d80eae598f89c3d8728118aa08e93cf372b0f8bf0c7e5249b695dee7d41506cfd161088a
-
Filesize
103KB
MD5af492f4985b1486f035a2199086921c3
SHA1748a4865c24eb3c0e21a5b9e6e32a8f9ac2130f0
SHA2568be655497ded041cc896788e543e5dad24a5dea518f9d869e376948b004c2e71
SHA5127cb35416aa9e537438158acba7b2bbd9685466800bcfe99429b90e26d80eae598f89c3d8728118aa08e93cf372b0f8bf0c7e5249b695dee7d41506cfd161088a
-
Filesize
103KB
MD5af492f4985b1486f035a2199086921c3
SHA1748a4865c24eb3c0e21a5b9e6e32a8f9ac2130f0
SHA2568be655497ded041cc896788e543e5dad24a5dea518f9d869e376948b004c2e71
SHA5127cb35416aa9e537438158acba7b2bbd9685466800bcfe99429b90e26d80eae598f89c3d8728118aa08e93cf372b0f8bf0c7e5249b695dee7d41506cfd161088a