Analysis
-
max time kernel
21s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 16:27
Static task
static1
Behavioral task
behavioral1
Sample
5bfab23aa8655fda15f07e294e61e40a03cbba08b9341fd246110a426dbb1ea6.exe
Resource
win7-20220812-en
General
-
Target
5bfab23aa8655fda15f07e294e61e40a03cbba08b9341fd246110a426dbb1ea6.exe
-
Size
2.6MB
-
MD5
c06f8e06b571d480c80e6df87cda2b1b
-
SHA1
e9654617e3871194391ecddbb1411e662e1fe061
-
SHA256
5bfab23aa8655fda15f07e294e61e40a03cbba08b9341fd246110a426dbb1ea6
-
SHA512
4c43d52d2211a3328cda59f20e05d35149dec8cfb67f61bac5fe31657d5b135929cb4c063637efaf622f510dfddcbc4941c0c269360e95bc380a6c60258c2aa3
-
SSDEEP
49152:IWqF9cdbC6MQoYz2iMVZKJFkAFY3QiWEtb4QH2AsSx7co0q33+:sF9++Tw2iywoQirtb4QH2AYq33+
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 1524 rinst.exe 1712 AirDropInject.exe 1856 aw.exe 612 awr.exe 1732 uninst.tmp -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Wine uninst.tmp Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Wine rinst.exe Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Wine aw.exe Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Wine awr.exe -
Loads dropped DLL 6 IoCs
pid Process 1928 5bfab23aa8655fda15f07e294e61e40a03cbba08b9341fd246110a426dbb1ea6.exe 1524 rinst.exe 1524 rinst.exe 1856 aw.exe 1856 aw.exe 612 awr.exe -
resource yara_rule behavioral1/files/0x000600000001413c-55.dat themida behavioral1/files/0x000600000001413c-57.dat themida behavioral1/files/0x000600000001413c-65.dat themida behavioral1/files/0x000600000001420d-70.dat themida behavioral1/files/0x000600000001420d-76.dat themida behavioral1/memory/1524-75-0x0000000000400000-0x000000000052B000-memory.dmp themida behavioral1/memory/1524-74-0x0000000000400000-0x000000000052B000-memory.dmp themida behavioral1/memory/1856-79-0x0000000000400000-0x00000000005D4000-memory.dmp themida behavioral1/files/0x00090000000139f2-85.dat themida behavioral1/files/0x000b000000013473-82.dat themida behavioral1/files/0x000600000001420d-80.dat themida behavioral1/files/0x00090000000139f2-86.dat themida behavioral1/files/0x00090000000139f2-88.dat themida behavioral1/files/0x000b000000013473-89.dat themida behavioral1/memory/1856-90-0x0000000000400000-0x00000000005D4000-memory.dmp themida behavioral1/memory/612-92-0x0000000000400000-0x000000000052B000-memory.dmp themida behavioral1/memory/1856-93-0x0000000010000000-0x000000001011A000-memory.dmp themida behavioral1/files/0x00060000000142c6-95.dat themida behavioral1/memory/612-98-0x0000000000400000-0x000000000052B000-memory.dmp themida behavioral1/files/0x00060000000142c6-97.dat themida behavioral1/memory/1856-99-0x0000000000400000-0x00000000005D4000-memory.dmp themida behavioral1/memory/1732-100-0x0000000000400000-0x000000000052B000-memory.dmp themida behavioral1/memory/1732-103-0x0000000000400000-0x000000000052B000-memory.dmp themida behavioral1/memory/1732-106-0x0000000000400000-0x000000000052B000-memory.dmp themida -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Control Panel 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Control Panel\Accessibility\Blind Access\On = "0" aw.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1856 aw.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1856 aw.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1856 aw.exe 1856 aw.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1928 wrote to memory of 1524 1928 5bfab23aa8655fda15f07e294e61e40a03cbba08b9341fd246110a426dbb1ea6.exe 27 PID 1928 wrote to memory of 1524 1928 5bfab23aa8655fda15f07e294e61e40a03cbba08b9341fd246110a426dbb1ea6.exe 27 PID 1928 wrote to memory of 1524 1928 5bfab23aa8655fda15f07e294e61e40a03cbba08b9341fd246110a426dbb1ea6.exe 27 PID 1928 wrote to memory of 1524 1928 5bfab23aa8655fda15f07e294e61e40a03cbba08b9341fd246110a426dbb1ea6.exe 27 PID 1524 wrote to memory of 1712 1524 rinst.exe 28 PID 1524 wrote to memory of 1712 1524 rinst.exe 28 PID 1524 wrote to memory of 1712 1524 rinst.exe 28 PID 1524 wrote to memory of 1712 1524 rinst.exe 28 PID 1524 wrote to memory of 1856 1524 rinst.exe 29 PID 1524 wrote to memory of 1856 1524 rinst.exe 29 PID 1524 wrote to memory of 1856 1524 rinst.exe 29 PID 1524 wrote to memory of 1856 1524 rinst.exe 29 PID 1856 wrote to memory of 612 1856 aw.exe 30 PID 1856 wrote to memory of 612 1856 aw.exe 30 PID 1856 wrote to memory of 612 1856 aw.exe 30 PID 1856 wrote to memory of 612 1856 aw.exe 30 PID 612 wrote to memory of 1732 612 awr.exe 31 PID 612 wrote to memory of 1732 612 awr.exe 31 PID 612 wrote to memory of 1732 612 awr.exe 31 PID 612 wrote to memory of 1732 612 awr.exe 31 PID 612 wrote to memory of 1732 612 awr.exe 31 PID 612 wrote to memory of 1732 612 awr.exe 31 PID 612 wrote to memory of 1732 612 awr.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bfab23aa8655fda15f07e294e61e40a03cbba08b9341fd246110a426dbb1ea6.exe"C:\Users\Admin\AppData\Local\Temp\5bfab23aa8655fda15f07e294e61e40a03cbba08b9341fd246110a426dbb1ea6.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe"2⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\AirDropInject.exe"C:\Users\Admin\AppData\Local\Temp\AirDropInject.exe"3⤵
- Executes dropped EXE
PID:1712
-
-
C:\Users\Admin\AppData\Local\Temp\pk\aw.exeC:\Users\Admin\AppData\Local\Temp\pk\aw.exe3⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Modifies Control Panel
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\pk\awr.exeC:\Users\Admin\AppData\Local\Temp\pk\awr.exe u4⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Users\Admin\AppData\Local\Temp\uninst.tmpC:\Users\Admin\AppData\Local\Temp\uninst.tmp u25⤵
- Executes dropped EXE
- Identifies Wine through registry keys
PID:1732
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
828KB
MD5bf45bee1057e719d76b5496390dc9de6
SHA13329837e70687a23dee80824c9093716ce819edb
SHA2569b5e77164e6a7809c6f80a73c0ead37dc882deab424dd408a75da22495b3ed1f
SHA512ac80087726098efa3b8fac0d5f262f752167a01046035566ddaa82a4aaae0af641fb3375e561a22734f34d6af65c4e519f917c673209e162ab95b27a86429c3c
-
Filesize
828KB
MD5bf45bee1057e719d76b5496390dc9de6
SHA13329837e70687a23dee80824c9093716ce819edb
SHA2569b5e77164e6a7809c6f80a73c0ead37dc882deab424dd408a75da22495b3ed1f
SHA512ac80087726098efa3b8fac0d5f262f752167a01046035566ddaa82a4aaae0af641fb3375e561a22734f34d6af65c4e519f917c673209e162ab95b27a86429c3c
-
Filesize
828KB
MD5bf45bee1057e719d76b5496390dc9de6
SHA13329837e70687a23dee80824c9093716ce819edb
SHA2569b5e77164e6a7809c6f80a73c0ead37dc882deab424dd408a75da22495b3ed1f
SHA512ac80087726098efa3b8fac0d5f262f752167a01046035566ddaa82a4aaae0af641fb3375e561a22734f34d6af65c4e519f917c673209e162ab95b27a86429c3c
-
Filesize
831KB
MD51aa86c490e4cd6129e46cea5a2eed6ee
SHA1c47c3409d0f5a42e9251d6e4f1df1af3ad1604ab
SHA256d8ae8d163e7f13efded7776f1bb8da2cbdb0d6a98be49be3f1160899d974e890
SHA51258926c05a2c6f99d158e619b852772fe8b7b8ab741f73c50842f965c2ed85556c50593e3ca2ad21eb5a97128f11e5fc0ac5d8fe55943a1fc44d83e8785363d73
-
Filesize
514KB
MD53159e47106badb5e371bf47c817798a3
SHA121604a71e407e0a35bad44860557767e34307a9a
SHA256de1ca752388daef62569292bbae5285d996aeea5a2a4740b56ec70266672c5e5
SHA512633cbbf61909ae7109e17a396c758cfeb25528ce381bc5778ec86c26e5f7b7698097c984d34e56c4cc6a87e8d2740a9df676f69b536b0c3db8122105e7ed27f1
-
Filesize
482KB
MD592f9c5a509dadd8d0d3c12fbdf568d80
SHA1ad3a3cfdcfc57f2f19f4ee4c2f7a062a380eac1f
SHA256c8ae65d6e0e4f5cd2582c5a27713a33ee3715bbeb3ee011012b49a3354d1898d
SHA51203b4c81cb5d3eb81af3dfa1004d4983fdfe07c03fe45bd5d8ac8d27de0bf13a50b6f880245b8ad43a9dd39a0d1146fcf5a8650954328809c5da7780547833754
-
Filesize
1KB
MD5d2c1da1befeca59d0fe0d2232b74d5e5
SHA10e94cac297eb55155d2d5c8c757a1456516a8cf4
SHA256a8fd43324236681680bf04eec633da377383646b1404c97bb430f152d5c0815c
SHA512a5d13c30085cae9243a07b704498f81d80e34518b1d4f7b110c723381bec84501112b5aabcc268e434591e74dc65d7f4c0616d1e577a426a7beee60af6f460c1
-
Filesize
9KB
MD5b8af1857fe91d5d871e6e49cdef10662
SHA151b8f9c70c915bba4d13851eafea94a5ea546a77
SHA256d7010539eea80890b916320907377bbb0f4b830b7efdfbba569ba114b6989800
SHA5122c6ef98f6ae8786abf11ba023c11a774501b05add9997a06e992e5d6325c845be05e957beecebd66ce6372b929ba0a0f7bdc9bd509c6cf6973f74df20ff1b235
-
Filesize
511KB
MD5e436b13f39bd4a91416729d975f2d79e
SHA1896536accf0e14080b3cf63dea816ec8f6b50c10
SHA2568b0dd069a03d1039f106878c4f8eec508d84ba98811fdcb4425beb38a1452a77
SHA5121fb796e3d64824284f15338e45f3d6bd5a1253359a8411d7a493a96de80af2b788d823411868bfaa16a5052b47e061010843341225124858904f80a01d43f491
-
Filesize
511KB
MD5e436b13f39bd4a91416729d975f2d79e
SHA1896536accf0e14080b3cf63dea816ec8f6b50c10
SHA2568b0dd069a03d1039f106878c4f8eec508d84ba98811fdcb4425beb38a1452a77
SHA5121fb796e3d64824284f15338e45f3d6bd5a1253359a8411d7a493a96de80af2b788d823411868bfaa16a5052b47e061010843341225124858904f80a01d43f491
-
Filesize
1KB
MD5d2c1da1befeca59d0fe0d2232b74d5e5
SHA10e94cac297eb55155d2d5c8c757a1456516a8cf4
SHA256a8fd43324236681680bf04eec633da377383646b1404c97bb430f152d5c0815c
SHA512a5d13c30085cae9243a07b704498f81d80e34518b1d4f7b110c723381bec84501112b5aabcc268e434591e74dc65d7f4c0616d1e577a426a7beee60af6f460c1
-
Filesize
831KB
MD5c247cf657963dc3d2b369f96e460c1e6
SHA1678c65bf7d35c738428bd3118b13993c1706017a
SHA25669a89f3d50a6942bf7fede5014122054ecbfee64cd7a8998cdc35bca432c793e
SHA5120a89c051545c20ce961c2b21daee85ba54f400afe208a3ca924e1566fa679d2d70efd9ddd955f36885c8d18131dfa3191ad9434b7f808c9b2547b331cc303887
-
Filesize
831KB
MD5c247cf657963dc3d2b369f96e460c1e6
SHA1678c65bf7d35c738428bd3118b13993c1706017a
SHA25669a89f3d50a6942bf7fede5014122054ecbfee64cd7a8998cdc35bca432c793e
SHA5120a89c051545c20ce961c2b21daee85ba54f400afe208a3ca924e1566fa679d2d70efd9ddd955f36885c8d18131dfa3191ad9434b7f808c9b2547b331cc303887
-
Filesize
514KB
MD5685ce717784933dcc61614c3eca8c068
SHA16c14586f9f886f77973d9bde93589bdcdc29290a
SHA256f1cd266559a3864771c13e9973212f3c5bc7eab5c1b32762814fffff24aad95b
SHA5129e5864e8a92784ba98b51648e46eaee61d21049f6b796478507a1a3ce14a9d23afc0bb959dd8ba05ec2dcc7e930f68191e96ec8f87c7bb79d81382940613811f
-
Filesize
511KB
MD5e436b13f39bd4a91416729d975f2d79e
SHA1896536accf0e14080b3cf63dea816ec8f6b50c10
SHA2568b0dd069a03d1039f106878c4f8eec508d84ba98811fdcb4425beb38a1452a77
SHA5121fb796e3d64824284f15338e45f3d6bd5a1253359a8411d7a493a96de80af2b788d823411868bfaa16a5052b47e061010843341225124858904f80a01d43f491
-
Filesize
482KB
MD5fbe0ea86e553589f0761d979bccdf359
SHA1fa592e7178d38adcb25a7c0216987ccdba9c9a01
SHA256836ab30aac2dc0727b0407df8b7187deacae1e469b682453312392c2ab4a9f17
SHA512d2e1a2e6fd6d7987649946a4687fa2e8cf8d87b89b881cee49b9fdf162430bb06728bc0f3fd343d9045476ee8ff24070c43edade1c1af9649d78c94a7c6b5cc5
-
Filesize
1KB
MD5d2c1da1befeca59d0fe0d2232b74d5e5
SHA10e94cac297eb55155d2d5c8c757a1456516a8cf4
SHA256a8fd43324236681680bf04eec633da377383646b1404c97bb430f152d5c0815c
SHA512a5d13c30085cae9243a07b704498f81d80e34518b1d4f7b110c723381bec84501112b5aabcc268e434591e74dc65d7f4c0616d1e577a426a7beee60af6f460c1
-
Filesize
9KB
MD5b2154e2b2d46cc65b640b89de3ba3a1c
SHA126c0231d88e46bbb9c1325e5d9f2af24ae514f9b
SHA256e2b24ffbd319a35d0f8f4ea543b9b6296c4906d327d4bda34c86bc7b086482b7
SHA51210acf86b915491685a704af8a5e7fd04fa4b430e0f5bcb2401a77a46b1217501088ab1291c9c6a06b595f998d09b60ff506e234f22a4ce046960fce85cbba951
-
Filesize
9KB
MD5c0095d5dae3422bc307ae5dcd676bdbd
SHA1f409ab4bf88f662a575d66e9b284aff8da11fef8
SHA256c1caa55ed84667f0adf2ea52d0e3a73d34c482ea3fdbafdff88959ecda1e811f
SHA512c6f10e8f9672fa251a41f0f0da4ea340573b64683f691aa1df73c791138018d0190f0126322f4a11173b662f5d7ac71a5b11eeaf3804973b978ddb783ccb7d5f
-
Filesize
511KB
MD5e436b13f39bd4a91416729d975f2d79e
SHA1896536accf0e14080b3cf63dea816ec8f6b50c10
SHA2568b0dd069a03d1039f106878c4f8eec508d84ba98811fdcb4425beb38a1452a77
SHA5121fb796e3d64824284f15338e45f3d6bd5a1253359a8411d7a493a96de80af2b788d823411868bfaa16a5052b47e061010843341225124858904f80a01d43f491
-
Filesize
511KB
MD5e436b13f39bd4a91416729d975f2d79e
SHA1896536accf0e14080b3cf63dea816ec8f6b50c10
SHA2568b0dd069a03d1039f106878c4f8eec508d84ba98811fdcb4425beb38a1452a77
SHA5121fb796e3d64824284f15338e45f3d6bd5a1253359a8411d7a493a96de80af2b788d823411868bfaa16a5052b47e061010843341225124858904f80a01d43f491
-
Filesize
828KB
MD5bf45bee1057e719d76b5496390dc9de6
SHA13329837e70687a23dee80824c9093716ce819edb
SHA2569b5e77164e6a7809c6f80a73c0ead37dc882deab424dd408a75da22495b3ed1f
SHA512ac80087726098efa3b8fac0d5f262f752167a01046035566ddaa82a4aaae0af641fb3375e561a22734f34d6af65c4e519f917c673209e162ab95b27a86429c3c
-
Filesize
511KB
MD5e436b13f39bd4a91416729d975f2d79e
SHA1896536accf0e14080b3cf63dea816ec8f6b50c10
SHA2568b0dd069a03d1039f106878c4f8eec508d84ba98811fdcb4425beb38a1452a77
SHA5121fb796e3d64824284f15338e45f3d6bd5a1253359a8411d7a493a96de80af2b788d823411868bfaa16a5052b47e061010843341225124858904f80a01d43f491
-
Filesize
831KB
MD5c247cf657963dc3d2b369f96e460c1e6
SHA1678c65bf7d35c738428bd3118b13993c1706017a
SHA25669a89f3d50a6942bf7fede5014122054ecbfee64cd7a8998cdc35bca432c793e
SHA5120a89c051545c20ce961c2b21daee85ba54f400afe208a3ca924e1566fa679d2d70efd9ddd955f36885c8d18131dfa3191ad9434b7f808c9b2547b331cc303887
-
Filesize
511KB
MD5e436b13f39bd4a91416729d975f2d79e
SHA1896536accf0e14080b3cf63dea816ec8f6b50c10
SHA2568b0dd069a03d1039f106878c4f8eec508d84ba98811fdcb4425beb38a1452a77
SHA5121fb796e3d64824284f15338e45f3d6bd5a1253359a8411d7a493a96de80af2b788d823411868bfaa16a5052b47e061010843341225124858904f80a01d43f491
-
Filesize
482KB
MD5fbe0ea86e553589f0761d979bccdf359
SHA1fa592e7178d38adcb25a7c0216987ccdba9c9a01
SHA256836ab30aac2dc0727b0407df8b7187deacae1e469b682453312392c2ab4a9f17
SHA512d2e1a2e6fd6d7987649946a4687fa2e8cf8d87b89b881cee49b9fdf162430bb06728bc0f3fd343d9045476ee8ff24070c43edade1c1af9649d78c94a7c6b5cc5
-
Filesize
511KB
MD5e436b13f39bd4a91416729d975f2d79e
SHA1896536accf0e14080b3cf63dea816ec8f6b50c10
SHA2568b0dd069a03d1039f106878c4f8eec508d84ba98811fdcb4425beb38a1452a77
SHA5121fb796e3d64824284f15338e45f3d6bd5a1253359a8411d7a493a96de80af2b788d823411868bfaa16a5052b47e061010843341225124858904f80a01d43f491