Analysis

  • max time kernel
    24s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    20-06-2022 07:40

General

  • Target

    b7dfbb262541c2fadae34f13363f3d42329aabb380ae9d16021954569c4cb77e.exe

  • Size

    2.1MB

  • MD5

    323a8aba0c38d245a7b05448c8d8ec43

  • SHA1

    8246f104551fbd8cda34b3e05c4445d358ee3b48

  • SHA256

    b7dfbb262541c2fadae34f13363f3d42329aabb380ae9d16021954569c4cb77e

  • SHA512

    e882c9200446a4d6ed60bc96bc512daadcb2c80e6b819061e91f0b4ef1b529e5a6e393d34715b57ffb59dd014b6de359c6b68ca32add7ae4b9de440c69ec01f6

Score
7/10

Malware Config

Signatures

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b7dfbb262541c2fadae34f13363f3d42329aabb380ae9d16021954569c4cb77e.exe
    "C:\Users\Admin\AppData\Local\Temp\b7dfbb262541c2fadae34f13363f3d42329aabb380ae9d16021954569c4cb77e.exe"
    1⤵
    • Identifies Wine through registry keys
    • Suspicious behavior: EnumeratesProcesses
    PID:1888

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

1
T1012

Virtualization/Sandbox Evasion

1
T1497

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1888-54-0x0000000000400000-0x0000000000627000-memory.dmp
    Filesize

    2.2MB

  • memory/1888-55-0x0000000001E60000-0x0000000001F4C000-memory.dmp
    Filesize

    944KB

  • memory/1888-56-0x0000000000400000-0x0000000000627000-memory.dmp
    Filesize

    2.2MB