Analysis
-
max time kernel
83s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
22-06-2022 07:09
Static task
static1
Behavioral task
behavioral1
Sample
adab176fb6432d017367f7499f58b3e49122723996ec34c69b0ddb1b73f7f97d.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
adab176fb6432d017367f7499f58b3e49122723996ec34c69b0ddb1b73f7f97d.exe
-
Size
1.4MB
-
MD5
2ebea2449c7db471df4d62d6337d3cf1
-
SHA1
823a2ebde512ecb878d1d57a18fa6c51adcb425f
-
SHA256
adab176fb6432d017367f7499f58b3e49122723996ec34c69b0ddb1b73f7f97d
-
SHA512
b90fbeb3a9b4ee20982051922c741ed9670b8cb013b7fa020a30776c8be943a3c461935ce3621aec4cc185bb2a2a81a831095ba6f581e9f43ba0998749648178
Score
7/10
Malware Config
Signatures
-
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
adab176fb6432d017367f7499f58b3e49122723996ec34c69b0ddb1b73f7f97d.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Wine adab176fb6432d017367f7499f58b3e49122723996ec34c69b0ddb1b73f7f97d.exe -
Processes:
resource yara_rule behavioral1/memory/532-54-0x0000000000400000-0x00000000006FC000-memory.dmp themida behavioral1/memory/532-55-0x0000000000400000-0x00000000006FC000-memory.dmp themida behavioral1/memory/532-56-0x0000000000400000-0x00000000006FC000-memory.dmp themida behavioral1/memory/532-57-0x0000000000400000-0x00000000006FC000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
adab176fb6432d017367f7499f58b3e49122723996ec34c69b0ddb1b73f7f97d.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RUN\adab176fb6432d017367f7499f58b3e49122723996ec34c69b0ddb1b73f7f97d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\adab176fb6432d017367f7499f58b3e49122723996ec34c69b0ddb1b73f7f97d.exe" adab176fb6432d017367f7499f58b3e49122723996ec34c69b0ddb1b73f7f97d.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
adab176fb6432d017367f7499f58b3e49122723996ec34c69b0ddb1b73f7f97d.exepid process 532 adab176fb6432d017367f7499f58b3e49122723996ec34c69b0ddb1b73f7f97d.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
adab176fb6432d017367f7499f58b3e49122723996ec34c69b0ddb1b73f7f97d.exepid process 532 adab176fb6432d017367f7499f58b3e49122723996ec34c69b0ddb1b73f7f97d.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
adab176fb6432d017367f7499f58b3e49122723996ec34c69b0ddb1b73f7f97d.exepid process 532 adab176fb6432d017367f7499f58b3e49122723996ec34c69b0ddb1b73f7f97d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\adab176fb6432d017367f7499f58b3e49122723996ec34c69b0ddb1b73f7f97d.exe"C:\Users\Admin\AppData\Local\Temp\adab176fb6432d017367f7499f58b3e49122723996ec34c69b0ddb1b73f7f97d.exe"1⤵
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/532-54-0x0000000000400000-0x00000000006FC000-memory.dmpFilesize
3.0MB
-
memory/532-55-0x0000000000400000-0x00000000006FC000-memory.dmpFilesize
3.0MB
-
memory/532-56-0x0000000000400000-0x00000000006FC000-memory.dmpFilesize
3.0MB
-
memory/532-57-0x0000000000400000-0x00000000006FC000-memory.dmpFilesize
3.0MB