Analysis

  • max time kernel
    105s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    19/10/2022, 17:21

General

  • Target

    289d9ceaf6530ab298972e364233604eeb0e5ab513c2c9153c9e52d5cf6b1e9e.exe

  • Size

    698KB

  • MD5

    917b037ccfe24c51c2d4deaa007995ad

  • SHA1

    91edcc2fb181c37a1920602079d6f68215203aa0

  • SHA256

    289d9ceaf6530ab298972e364233604eeb0e5ab513c2c9153c9e52d5cf6b1e9e

  • SHA512

    7eb4d87ad5a757d98a7fef619a0c226264f3b151e0f7bb50908cc40a87f2dda2e41951806bc4945ed069d46ab8b30254507e57537a88732e140932ee360a26fd

  • SSDEEP

    12288:tpr0l29vZ/knYYWTGpn2m6tsIlnQvf2UyYOUntaFQ6aH/db4:7rA2TYYHCpnpmQH2XYOUnETaH

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\289d9ceaf6530ab298972e364233604eeb0e5ab513c2c9153c9e52d5cf6b1e9e.exe
    "C:\Users\Admin\AppData\Local\Temp\289d9ceaf6530ab298972e364233604eeb0e5ab513c2c9153c9e52d5cf6b1e9e.exe"
    1⤵
    • Identifies Wine through registry keys
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1348
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:768
      • C:\Program Files\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:432
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:432 CREDAT:275457 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1784
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:432 CREDAT:6501379 /prefetch:2
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:1632
    • C:\Windows\svcr.exe
      "C:\Windows\svcr.exe" "C:\Users\Admin\AppData\Local\Temp\289d9ceaf6530ab298972e364233604eeb0e5ab513c2c9153c9e52d5cf6b1e9e.exe"
      2⤵
      • Executes dropped EXE
      • Modifies Installed Components in the registry
      • Deletes itself
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:688
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:940
        • C:\Program Files\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files\Internet Explorer\IEXPLORE.EXE"
          4⤵
            PID:1200

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\QA7GO30U.txt

            Filesize

            608B

            MD5

            8e2f2c3301524a9733c29b13d249dc43

            SHA1

            d10950d51dc7d700594408c27788a0a55be762be

            SHA256

            51b56d4483aa03b9ed943b7366dfeba344c95ead5aa75a95d89fa93d59f4a0f4

            SHA512

            31c5bf107a0f170f7530c3d6113bbaf02a2bc4038a78b17bfc5846b3fbd115da32533eec39d2e9fa550dcdf5ec69c546badd19094683c8f259206565ca52f5e1

          • C:\Windows\svcr.exe

            Filesize

            698KB

            MD5

            917b037ccfe24c51c2d4deaa007995ad

            SHA1

            91edcc2fb181c37a1920602079d6f68215203aa0

            SHA256

            289d9ceaf6530ab298972e364233604eeb0e5ab513c2c9153c9e52d5cf6b1e9e

            SHA512

            7eb4d87ad5a757d98a7fef619a0c226264f3b151e0f7bb50908cc40a87f2dda2e41951806bc4945ed069d46ab8b30254507e57537a88732e140932ee360a26fd

          • memory/688-60-0x0000000010410000-0x000000001042E000-memory.dmp

            Filesize

            120KB

          • memory/688-67-0x0000000000400000-0x0000000000573000-memory.dmp

            Filesize

            1.4MB

          • memory/1348-54-0x0000000075601000-0x0000000075603000-memory.dmp

            Filesize

            8KB

          • memory/1348-57-0x0000000000400000-0x0000000000573000-memory.dmp

            Filesize

            1.4MB