Analysis
-
max time kernel
127s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
22-06-2022 00:23
Static task
static1
Behavioral task
behavioral1
Sample
2eff5cf40e42030dc9c838f6cea5382439ac6137a9313c345a99959af631aeae.exe
Resource
win7-20220414-en
General
-
Target
2eff5cf40e42030dc9c838f6cea5382439ac6137a9313c345a99959af631aeae.exe
-
Size
918KB
-
MD5
5a3270b10afcd92345fef736a534d8be
-
SHA1
74e0bb0819644c35b9044c39d9ba27a890759196
-
SHA256
2eff5cf40e42030dc9c838f6cea5382439ac6137a9313c345a99959af631aeae
-
SHA512
6806c7b3f1d23be7e2ac2404c8098dc40ca4fe727b7743364458fc8efb6a6c07872aa81ead472eab81ff668ff53c54dc204c94d3462d787ed577b2ef0820a346
Malware Config
Signatures
-
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
notepad.exe2eff5cf40e42030dc9c838f6cea5382439ac6137a9313c345a99959af631aeae.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Wine notepad.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Wine 2eff5cf40e42030dc9c838f6cea5382439ac6137a9313c345a99959af631aeae.exe -
Processes:
resource yara_rule behavioral1/memory/1684-54-0x0000000000400000-0x000000000060A000-memory.dmp themida behavioral1/memory/1652-57-0x0000000000400000-0x000000000060A000-memory.dmp themida behavioral1/memory/1652-60-0x0000000000400000-0x000000000060A000-memory.dmp themida behavioral1/memory/1684-61-0x0000000000400000-0x000000000060A000-memory.dmp themida behavioral1/memory/1652-62-0x0000000000400000-0x000000000060A000-memory.dmp themida behavioral1/memory/1652-63-0x0000000000400000-0x000000000060A000-memory.dmp themida \??\c:\ProgramData\MubwtvW\EcfbcoN\JgvkwbM.exe themida behavioral1/memory/1652-66-0x0000000000400000-0x000000000060A000-memory.dmp themida -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
notepad.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\JgvkwbM = "c:\\ProgramData\\MubwtvW\\EcfbcoN\\JgvkwbM.exe" notepad.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
2eff5cf40e42030dc9c838f6cea5382439ac6137a9313c345a99959af631aeae.exenotepad.exepid process 1684 2eff5cf40e42030dc9c838f6cea5382439ac6137a9313c345a99959af631aeae.exe 1652 notepad.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
2eff5cf40e42030dc9c838f6cea5382439ac6137a9313c345a99959af631aeae.exedescription pid process target process PID 1684 set thread context of 1652 1684 2eff5cf40e42030dc9c838f6cea5382439ac6137a9313c345a99959af631aeae.exe notepad.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
2eff5cf40e42030dc9c838f6cea5382439ac6137a9313c345a99959af631aeae.exenotepad.exepid process 1684 2eff5cf40e42030dc9c838f6cea5382439ac6137a9313c345a99959af631aeae.exe 1652 notepad.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
2eff5cf40e42030dc9c838f6cea5382439ac6137a9313c345a99959af631aeae.exedescription pid process target process PID 1684 wrote to memory of 1652 1684 2eff5cf40e42030dc9c838f6cea5382439ac6137a9313c345a99959af631aeae.exe notepad.exe PID 1684 wrote to memory of 1652 1684 2eff5cf40e42030dc9c838f6cea5382439ac6137a9313c345a99959af631aeae.exe notepad.exe PID 1684 wrote to memory of 1652 1684 2eff5cf40e42030dc9c838f6cea5382439ac6137a9313c345a99959af631aeae.exe notepad.exe PID 1684 wrote to memory of 1652 1684 2eff5cf40e42030dc9c838f6cea5382439ac6137a9313c345a99959af631aeae.exe notepad.exe PID 1684 wrote to memory of 1652 1684 2eff5cf40e42030dc9c838f6cea5382439ac6137a9313c345a99959af631aeae.exe notepad.exe PID 1684 wrote to memory of 1652 1684 2eff5cf40e42030dc9c838f6cea5382439ac6137a9313c345a99959af631aeae.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2eff5cf40e42030dc9c838f6cea5382439ac6137a9313c345a99959af631aeae.exe"C:\Users\Admin\AppData\Local\Temp\2eff5cf40e42030dc9c838f6cea5382439ac6137a9313c345a99959af631aeae.exe"1⤵
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\notepad.exeC:\Windows\system32\notepad.exe2⤵
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1652
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\??\c:\ProgramData\MubwtvW\EcfbcoN\JgvkwbM.exeFilesize
918KB
MD55a3270b10afcd92345fef736a534d8be
SHA174e0bb0819644c35b9044c39d9ba27a890759196
SHA2562eff5cf40e42030dc9c838f6cea5382439ac6137a9313c345a99959af631aeae
SHA5126806c7b3f1d23be7e2ac2404c8098dc40ca4fe727b7743364458fc8efb6a6c07872aa81ead472eab81ff668ff53c54dc204c94d3462d787ed577b2ef0820a346
-
memory/1652-55-0x0000000000400000-0x000000000060A000-memory.dmpFilesize
2.0MB
-
memory/1652-57-0x0000000000400000-0x000000000060A000-memory.dmpFilesize
2.0MB
-
memory/1652-58-0x00000000004A9014-mapping.dmp
-
memory/1652-60-0x0000000000400000-0x000000000060A000-memory.dmpFilesize
2.0MB
-
memory/1652-62-0x0000000000400000-0x000000000060A000-memory.dmpFilesize
2.0MB
-
memory/1652-63-0x0000000000400000-0x000000000060A000-memory.dmpFilesize
2.0MB
-
memory/1652-64-0x0000000000401000-0x0000000000449000-memory.dmpFilesize
288KB
-
memory/1652-66-0x0000000000400000-0x000000000060A000-memory.dmpFilesize
2.0MB
-
memory/1684-54-0x0000000000400000-0x000000000060A000-memory.dmpFilesize
2.0MB
-
memory/1684-61-0x0000000000400000-0x000000000060A000-memory.dmpFilesize
2.0MB