Analysis
-
max time kernel
84s -
max time network
119s -
platform
windows10_x64 -
resource
win10 -
submitted
30-06-2020 12:05
Static task
static1
Behavioral task
behavioral1
Sample
618a1e3551560b86454450f3ea580029.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
618a1e3551560b86454450f3ea580029.exe
Resource
win10
General
-
Target
618a1e3551560b86454450f3ea580029.exe
-
Size
584KB
-
MD5
618a1e3551560b86454450f3ea580029
-
SHA1
39d86228750d1eebdb78f60b03c3b638acf72d34
-
SHA256
6edb794a9f28cbd60dcb9fefc0e145f64c9e623b3df235a4a907ca948fd1edb9
-
SHA512
d5b309a0ff9b07e74c9cee1df37a627193393de7cc0fe079ab606d94b2beac948c8d7d25378de3cf87b00c7227c70fa8e49291d6060a7254e2ce0439a09c2305
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
618a1e3551560b86454450f3ea580029.exepid process 3984 618a1e3551560b86454450f3ea580029.exe 3984 618a1e3551560b86454450f3ea580029.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
618a1e3551560b86454450f3ea580029.exe66545a.exepid process 3984 618a1e3551560b86454450f3ea580029.exe 3984 618a1e3551560b86454450f3ea580029.exe 3984 618a1e3551560b86454450f3ea580029.exe 3984 618a1e3551560b86454450f3ea580029.exe 3984 618a1e3551560b86454450f3ea580029.exe 3984 618a1e3551560b86454450f3ea580029.exe 3984 618a1e3551560b86454450f3ea580029.exe 3984 618a1e3551560b86454450f3ea580029.exe 3984 618a1e3551560b86454450f3ea580029.exe 3984 618a1e3551560b86454450f3ea580029.exe 3984 618a1e3551560b86454450f3ea580029.exe 3984 618a1e3551560b86454450f3ea580029.exe 3984 618a1e3551560b86454450f3ea580029.exe 3984 618a1e3551560b86454450f3ea580029.exe 3984 618a1e3551560b86454450f3ea580029.exe 3984 618a1e3551560b86454450f3ea580029.exe 3744 66545a.exe 3744 66545a.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
618a1e3551560b86454450f3ea580029.exedescription pid process target process PID 3984 wrote to memory of 3744 3984 618a1e3551560b86454450f3ea580029.exe 66545a.exe PID 3984 wrote to memory of 3744 3984 618a1e3551560b86454450f3ea580029.exe 66545a.exe PID 3984 wrote to memory of 3744 3984 618a1e3551560b86454450f3ea580029.exe 66545a.exe PID 3984 wrote to memory of 424 3984 618a1e3551560b86454450f3ea580029.exe cmd.exe PID 3984 wrote to memory of 424 3984 618a1e3551560b86454450f3ea580029.exe cmd.exe PID 3984 wrote to memory of 424 3984 618a1e3551560b86454450f3ea580029.exe cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
66545a.exepid process 3744 66545a.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
66545a.exepid process 3744 66545a.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
66545a.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 66545a.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
66545a.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2066881839-3229799743-3576549721-1000\Software\Wine 66545a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\618a1e3551560b86454450f3ea580029.exe"C:\Users\Admin\AppData\Local\Temp\618a1e3551560b86454450f3ea580029.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\66545a.exe"C:\Users\Admin\AppData\Local\Temp\66545a.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Identifies Wine through registry keys
-
C:\Windows\SysWOW64\cmd.execmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\618a1e3551560b86454450f3ea580029.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\66545a.exe
-
C:\Users\Admin\AppData\Local\Temp\66545a.exe
-
memory/424-3-0x0000000000000000-mapping.dmp
-
memory/3744-0-0x0000000000000000-mapping.dmp
-
memory/3744-4-0x0000000005B00000-0x0000000005B01000-memory.dmpFilesize
4KB
-
memory/3744-5-0x0000000006300000-0x0000000006301000-memory.dmpFilesize
4KB