Analysis
-
max time kernel
349s -
max time network
419s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 05:12
Static task
static1
Behavioral task
behavioral1
Sample
7474861a84b08d8a11092a12900011e9eefb8aa617b275a420289503d8ceaa39.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7474861a84b08d8a11092a12900011e9eefb8aa617b275a420289503d8ceaa39.exe
Resource
win10v2004-20221111-en
General
-
Target
7474861a84b08d8a11092a12900011e9eefb8aa617b275a420289503d8ceaa39.exe
-
Size
1.4MB
-
MD5
b3b58316d04d7c947d1041c1268c150d
-
SHA1
9f21e538b2a00aff4ed87ffbaf23da8285b3456f
-
SHA256
7474861a84b08d8a11092a12900011e9eefb8aa617b275a420289503d8ceaa39
-
SHA512
7efb64792ecfdcc8d5ecd1c76e261b3e03f86aa4f8a4a8a02ebca9356d3a9d903a550079cdfaff10af8ba5c2267f1069ce0521c0ed5ec9861a9bb4943d4760ec
-
SSDEEP
24576:7wgANAvijIgVsRYO6rw2yKidN0dnG2SUYPudf3i3j1ji:PIQijIgCRYVrw9HdNWVpGuE3j1ji
Malware Config
Signatures
-
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
7474861a84b08d8a11092a12900011e9eefb8aa617b275a420289503d8ceaa39.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Wine 7474861a84b08d8a11092a12900011e9eefb8aa617b275a420289503d8ceaa39.exe -
Processes:
7474861a84b08d8a11092a12900011e9eefb8aa617b275a420289503d8ceaa39.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7474861a84b08d8a11092a12900011e9eefb8aa617b275a420289503d8ceaa39.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
7474861a84b08d8a11092a12900011e9eefb8aa617b275a420289503d8ceaa39.exedescription ioc process File opened for modification \??\PhysicalDrive0 7474861a84b08d8a11092a12900011e9eefb8aa617b275a420289503d8ceaa39.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
7474861a84b08d8a11092a12900011e9eefb8aa617b275a420289503d8ceaa39.exepid process 2436 7474861a84b08d8a11092a12900011e9eefb8aa617b275a420289503d8ceaa39.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
7474861a84b08d8a11092a12900011e9eefb8aa617b275a420289503d8ceaa39.exepid process 2436 7474861a84b08d8a11092a12900011e9eefb8aa617b275a420289503d8ceaa39.exe 2436 7474861a84b08d8a11092a12900011e9eefb8aa617b275a420289503d8ceaa39.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
7474861a84b08d8a11092a12900011e9eefb8aa617b275a420289503d8ceaa39.exepid process 2436 7474861a84b08d8a11092a12900011e9eefb8aa617b275a420289503d8ceaa39.exe 2436 7474861a84b08d8a11092a12900011e9eefb8aa617b275a420289503d8ceaa39.exe 2436 7474861a84b08d8a11092a12900011e9eefb8aa617b275a420289503d8ceaa39.exe 2436 7474861a84b08d8a11092a12900011e9eefb8aa617b275a420289503d8ceaa39.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7474861a84b08d8a11092a12900011e9eefb8aa617b275a420289503d8ceaa39.exe"C:\Users\Admin\AppData\Local\Temp\7474861a84b08d8a11092a12900011e9eefb8aa617b275a420289503d8ceaa39.exe"1⤵
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2436-132-0x0000000000400000-0x0000000000716000-memory.dmpFilesize
3.1MB
-
memory/2436-133-0x0000000000400000-0x0000000000716000-memory.dmpFilesize
3.1MB
-
memory/2436-134-0x0000000000400000-0x0000000000716000-memory.dmpFilesize
3.1MB
-
memory/2436-135-0x0000000000400000-0x0000000000716000-memory.dmpFilesize
3.1MB