Analysis

  • max time kernel
    3s
  • max time network
    13s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    13-05-2021 12:54

General

  • Target

    ed3cc6263d431f6da983641cfd09ca1d87e3ea319f254d36779cf827e3a2dd1f.exe

  • Size

    2.1MB

  • MD5

    583cabc27c03b2be3095678112891d5e

  • SHA1

    89800d941b3fd9ed51ddb92ebb4e745e47385c73

  • SHA256

    ed3cc6263d431f6da983641cfd09ca1d87e3ea319f254d36779cf827e3a2dd1f

  • SHA512

    49bcd0f6bd56592844f7dc4f0d6db66cdb477a99a7dce530a6a272b25aeb735393e1e4a974b03df72d773af1dabd2d50cee361e485e9ab3d9eaf8854123b76a4

Score
7/10

Malware Config

Signatures

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1288
      • C:\Users\Admin\AppData\Local\Temp\ed3cc6263d431f6da983641cfd09ca1d87e3ea319f254d36779cf827e3a2dd1f.exe
        "C:\Users\Admin\AppData\Local\Temp\ed3cc6263d431f6da983641cfd09ca1d87e3ea319f254d36779cf827e3a2dd1f.exe"
        2⤵
        • Identifies Wine through registry keys
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:484

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Virtualization/Sandbox Evasion

    1
    T1497

    Discovery

    Query Registry

    1
    T1012

    Virtualization/Sandbox Evasion

    1
    T1497

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/484-60-0x0000000075EF1000-0x0000000075EF3000-memory.dmp
      Filesize

      8KB

    • memory/484-61-0x0000000004340000-0x0000000004342000-memory.dmp
      Filesize

      8KB

    • memory/484-62-0x0000000004350000-0x0000000004351000-memory.dmp
      Filesize

      4KB

    • memory/484-63-0x0000000004330000-0x0000000004331000-memory.dmp
      Filesize

      4KB

    • memory/484-64-0x0000000010000000-0x0000000010011000-memory.dmp
      Filesize

      68KB