Analysis
-
max time kernel
203s -
max time network
75s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 22:02
Static task
static1
Behavioral task
behavioral1
Sample
9b0ea391bbf6e9d432e9db5bfedc3a70dde46858d8db77bab0abac10e1871321.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9b0ea391bbf6e9d432e9db5bfedc3a70dde46858d8db77bab0abac10e1871321.exe
Resource
win10v2004-20221111-en
General
-
Target
9b0ea391bbf6e9d432e9db5bfedc3a70dde46858d8db77bab0abac10e1871321.exe
-
Size
284KB
-
MD5
98f42963beb8c87b6e495ba807bc1cb2
-
SHA1
e5bdf17473779e9884de7818d7ce9c1e39a82015
-
SHA256
9b0ea391bbf6e9d432e9db5bfedc3a70dde46858d8db77bab0abac10e1871321
-
SHA512
fafd743234d2a91b48899f038552509b5842c1b28a16ac79b79c45cb7e88b477aa9995a2d6cf1c968de75ca2f7691708f7db4071a90793b36492bd4121318f61
-
SSDEEP
6144:FcL3oOaCI/+6W913yLmanlNj+bVXknpbAbVXknpbAbVXknpbAbVSKM/:yz6W91CLmanlNj+BXE5ABXE5ABXE5ABE
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 544 winlogin.exe 584 winlogin.exe -
Loads dropped DLL 3 IoCs
pid Process 572 9b0ea391bbf6e9d432e9db5bfedc3a70dde46858d8db77bab0abac10e1871321.exe 572 9b0ea391bbf6e9d432e9db5bfedc3a70dde46858d8db77bab0abac10e1871321.exe 544 winlogin.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ 9b0ea391bbf6e9d432e9db5bfedc3a70dde46858d8db77bab0abac10e1871321.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winlogon = "C:\\Users\\Admin\\AppData\\Local\\Temp\\winlogin.exe" 9b0ea391bbf6e9d432e9db5bfedc3a70dde46858d8db77bab0abac10e1871321.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1676 set thread context of 572 1676 9b0ea391bbf6e9d432e9db5bfedc3a70dde46858d8db77bab0abac10e1871321.exe 28 PID 544 set thread context of 584 544 winlogin.exe 30 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1676 9b0ea391bbf6e9d432e9db5bfedc3a70dde46858d8db77bab0abac10e1871321.exe 544 winlogin.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1676 wrote to memory of 572 1676 9b0ea391bbf6e9d432e9db5bfedc3a70dde46858d8db77bab0abac10e1871321.exe 28 PID 1676 wrote to memory of 572 1676 9b0ea391bbf6e9d432e9db5bfedc3a70dde46858d8db77bab0abac10e1871321.exe 28 PID 1676 wrote to memory of 572 1676 9b0ea391bbf6e9d432e9db5bfedc3a70dde46858d8db77bab0abac10e1871321.exe 28 PID 1676 wrote to memory of 572 1676 9b0ea391bbf6e9d432e9db5bfedc3a70dde46858d8db77bab0abac10e1871321.exe 28 PID 1676 wrote to memory of 572 1676 9b0ea391bbf6e9d432e9db5bfedc3a70dde46858d8db77bab0abac10e1871321.exe 28 PID 1676 wrote to memory of 572 1676 9b0ea391bbf6e9d432e9db5bfedc3a70dde46858d8db77bab0abac10e1871321.exe 28 PID 1676 wrote to memory of 572 1676 9b0ea391bbf6e9d432e9db5bfedc3a70dde46858d8db77bab0abac10e1871321.exe 28 PID 1676 wrote to memory of 572 1676 9b0ea391bbf6e9d432e9db5bfedc3a70dde46858d8db77bab0abac10e1871321.exe 28 PID 1676 wrote to memory of 572 1676 9b0ea391bbf6e9d432e9db5bfedc3a70dde46858d8db77bab0abac10e1871321.exe 28 PID 1676 wrote to memory of 572 1676 9b0ea391bbf6e9d432e9db5bfedc3a70dde46858d8db77bab0abac10e1871321.exe 28 PID 1676 wrote to memory of 572 1676 9b0ea391bbf6e9d432e9db5bfedc3a70dde46858d8db77bab0abac10e1871321.exe 28 PID 1676 wrote to memory of 572 1676 9b0ea391bbf6e9d432e9db5bfedc3a70dde46858d8db77bab0abac10e1871321.exe 28 PID 572 wrote to memory of 544 572 9b0ea391bbf6e9d432e9db5bfedc3a70dde46858d8db77bab0abac10e1871321.exe 29 PID 572 wrote to memory of 544 572 9b0ea391bbf6e9d432e9db5bfedc3a70dde46858d8db77bab0abac10e1871321.exe 29 PID 572 wrote to memory of 544 572 9b0ea391bbf6e9d432e9db5bfedc3a70dde46858d8db77bab0abac10e1871321.exe 29 PID 572 wrote to memory of 544 572 9b0ea391bbf6e9d432e9db5bfedc3a70dde46858d8db77bab0abac10e1871321.exe 29 PID 544 wrote to memory of 584 544 winlogin.exe 30 PID 544 wrote to memory of 584 544 winlogin.exe 30 PID 544 wrote to memory of 584 544 winlogin.exe 30 PID 544 wrote to memory of 584 544 winlogin.exe 30 PID 544 wrote to memory of 584 544 winlogin.exe 30 PID 544 wrote to memory of 584 544 winlogin.exe 30 PID 544 wrote to memory of 584 544 winlogin.exe 30 PID 544 wrote to memory of 584 544 winlogin.exe 30 PID 544 wrote to memory of 584 544 winlogin.exe 30 PID 544 wrote to memory of 584 544 winlogin.exe 30 PID 544 wrote to memory of 584 544 winlogin.exe 30 PID 544 wrote to memory of 584 544 winlogin.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b0ea391bbf6e9d432e9db5bfedc3a70dde46858d8db77bab0abac10e1871321.exe"C:\Users\Admin\AppData\Local\Temp\9b0ea391bbf6e9d432e9db5bfedc3a70dde46858d8db77bab0abac10e1871321.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\9b0ea391bbf6e9d432e9db5bfedc3a70dde46858d8db77bab0abac10e1871321.exe"C:\Users\Admin\AppData\Local\Temp\9b0ea391bbf6e9d432e9db5bfedc3a70dde46858d8db77bab0abac10e1871321.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Users\Admin\AppData\Local\Temp\winlogin.exe"C:\Users\Admin\AppData\Local\Temp\winlogin.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\AppData\Local\Temp\winlogin.exe"C:\Users\Admin\AppData\Local\Temp\winlogin.exe"4⤵
- Executes dropped EXE
PID:584
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD598f42963beb8c87b6e495ba807bc1cb2
SHA1e5bdf17473779e9884de7818d7ce9c1e39a82015
SHA2569b0ea391bbf6e9d432e9db5bfedc3a70dde46858d8db77bab0abac10e1871321
SHA512fafd743234d2a91b48899f038552509b5842c1b28a16ac79b79c45cb7e88b477aa9995a2d6cf1c968de75ca2f7691708f7db4071a90793b36492bd4121318f61
-
Filesize
284KB
MD598f42963beb8c87b6e495ba807bc1cb2
SHA1e5bdf17473779e9884de7818d7ce9c1e39a82015
SHA2569b0ea391bbf6e9d432e9db5bfedc3a70dde46858d8db77bab0abac10e1871321
SHA512fafd743234d2a91b48899f038552509b5842c1b28a16ac79b79c45cb7e88b477aa9995a2d6cf1c968de75ca2f7691708f7db4071a90793b36492bd4121318f61
-
Filesize
284KB
MD598f42963beb8c87b6e495ba807bc1cb2
SHA1e5bdf17473779e9884de7818d7ce9c1e39a82015
SHA2569b0ea391bbf6e9d432e9db5bfedc3a70dde46858d8db77bab0abac10e1871321
SHA512fafd743234d2a91b48899f038552509b5842c1b28a16ac79b79c45cb7e88b477aa9995a2d6cf1c968de75ca2f7691708f7db4071a90793b36492bd4121318f61
-
Filesize
284KB
MD598f42963beb8c87b6e495ba807bc1cb2
SHA1e5bdf17473779e9884de7818d7ce9c1e39a82015
SHA2569b0ea391bbf6e9d432e9db5bfedc3a70dde46858d8db77bab0abac10e1871321
SHA512fafd743234d2a91b48899f038552509b5842c1b28a16ac79b79c45cb7e88b477aa9995a2d6cf1c968de75ca2f7691708f7db4071a90793b36492bd4121318f61
-
Filesize
284KB
MD598f42963beb8c87b6e495ba807bc1cb2
SHA1e5bdf17473779e9884de7818d7ce9c1e39a82015
SHA2569b0ea391bbf6e9d432e9db5bfedc3a70dde46858d8db77bab0abac10e1871321
SHA512fafd743234d2a91b48899f038552509b5842c1b28a16ac79b79c45cb7e88b477aa9995a2d6cf1c968de75ca2f7691708f7db4071a90793b36492bd4121318f61
-
Filesize
284KB
MD598f42963beb8c87b6e495ba807bc1cb2
SHA1e5bdf17473779e9884de7818d7ce9c1e39a82015
SHA2569b0ea391bbf6e9d432e9db5bfedc3a70dde46858d8db77bab0abac10e1871321
SHA512fafd743234d2a91b48899f038552509b5842c1b28a16ac79b79c45cb7e88b477aa9995a2d6cf1c968de75ca2f7691708f7db4071a90793b36492bd4121318f61