Analysis
-
max time kernel
150s -
max time network
42s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
19-07-2020 17:19
Static task
static1
Behavioral task
behavioral1
Sample
vmzeus_3.3.6.0.vir.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
vmzeus_3.3.6.0.vir.exe
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
vmzeus_3.3.6.0.vir.exe
-
Size
277KB
-
MD5
ec3bc944c4c8844d63acdba9e36e67c9
-
SHA1
01a74db6a1c8d2064de42c73555d2a3644dc369a
-
SHA256
bf63837b5da7be5191e1c0b79a827ce8649971297f355845ae968cc44c7d9162
-
SHA512
7fb8b88ad47525b284aa005a1b3045c89fd424eece83b599d4271ebc2499cae5a32e642df04427548ea9e33183b2829c04d6e1a3fc287aff6ac9d6d96648e660
Score
8/10
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
xpersSun.exepid process 1668 xpersSun.exe 1668 xpersSun.exe 1668 xpersSun.exe 1668 xpersSun.exe 1668 xpersSun.exe 1668 xpersSun.exe 1668 xpersSun.exe 1668 xpersSun.exe 1668 xpersSun.exe 1668 xpersSun.exe 1668 xpersSun.exe 1668 xpersSun.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
vmzeus_3.3.6.0.vir.exexpersSun.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\WINE vmzeus_3.3.6.0.vir.exe Key opened \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\WINE xpersSun.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
xpersSun.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Windows\CurrentVersion\Run\{F0AB6736-2F23-167D-1F2B-F836ACD25AE9} = "C:\\Users\\Admin\\AppData\\Roaming\\Sun\\xpersSun.exe" xpersSun.exe Key created \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Windows\Currentversion\Run xpersSun.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
vmzeus_3.3.6.0.vir.exedescription pid process target process PID 1508 wrote to memory of 1668 1508 vmzeus_3.3.6.0.vir.exe xpersSun.exe PID 1508 wrote to memory of 1668 1508 vmzeus_3.3.6.0.vir.exe xpersSun.exe PID 1508 wrote to memory of 1668 1508 vmzeus_3.3.6.0.vir.exe xpersSun.exe PID 1508 wrote to memory of 2100 1508 vmzeus_3.3.6.0.vir.exe cmd.exe PID 1508 wrote to memory of 2100 1508 vmzeus_3.3.6.0.vir.exe cmd.exe PID 1508 wrote to memory of 2100 1508 vmzeus_3.3.6.0.vir.exe cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
xpersSun.exepid process 1668 xpersSun.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
xpersSun.exepid process 1668 xpersSun.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\vmzeus_3.3.6.0.vir.exe"C:\Users\Admin\AppData\Local\Temp\vmzeus_3.3.6.0.vir.exe"1⤵
- Identifies Wine through registry keys
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Sun\xpersSun.exe"C:\Users\Admin\AppData\Roaming\Sun\xpersSun.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Identifies Wine through registry keys
- Adds Run key to start application
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmp955b28fa.bat"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp955b28fa.bat
-
C:\Users\Admin\AppData\Roaming\Sun\xpersSun.exe
-
C:\Users\Admin\AppData\Roaming\Sun\xpersSun.exe
-
memory/1668-0-0x0000000000000000-mapping.dmp
-
memory/2100-3-0x0000000000000000-mapping.dmp