Analysis

  • max time kernel
    14s
  • max time network
    115s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    25-11-2020 15:39

General

  • Target

    pafish.exe

  • Size

    75KB

  • MD5

    9159edb64c4a21d8888d088bf2db23f3

  • SHA1

    124f46228d1e220d88ae5e9a24d6e713039a64f9

  • SHA256

    2180f4a13add5e346e8cf6994876a9d2f5eac3fcb695db8569537010d24cd6d5

  • SHA512

    4b6d56b81dd3cd42bb53fc8d68b5c8ef0d6c85ebcc503cd042ae5c19e8965e6477f259a02bafb9c5c66956ae1023fc30e3be5bbcd526eacc8480f93d74c1ab7c

Score
9/10

Malware Config

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\pafish.exe
    "C:\Users\Admin\AppData\Local\Temp\pafish.exe"
    1⤵
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious behavior: EnumeratesProcesses
    PID:744

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

5
T1497

Discovery

Query Registry

6
T1012

Virtualization/Sandbox Evasion

5
T1497

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads