Analysis

  • max time kernel
    43s
  • max time network
    110s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 05:56

General

  • Target

    7dac01b2ac7ade6f6040d9e4fbc5dce13fd3a894539ab49292fa6c34f37deffc.exe

  • Size

    1.2MB

  • MD5

    0671e7edcf762a7e79b6c3dc75fb600b

  • SHA1

    ca994f4101edbec3dd84251cb878298d05579ce1

  • SHA256

    7dac01b2ac7ade6f6040d9e4fbc5dce13fd3a894539ab49292fa6c34f37deffc

  • SHA512

    e9826fb6ab81330fb7e56d7b022de6ee4b01810d3a631ab97ead98ec1b9def947f5c5c28915e44e410392b185880e161e1982a37a4a475324f6c3575e02d22ee

  • SSDEEP

    24576:PMIfEJBN7PBYCbyiVtWlHwpyUBHXaQ98McgD7/vIeLl+X8:NYfLyiVtmtQ9J7QQ7

Score
7/10

Malware Config

Signatures

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Themida packer 3 IoCs

    Detects Themida, an advanced Windows software protection system.

  • AutoIT Executable 2 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7dac01b2ac7ade6f6040d9e4fbc5dce13fd3a894539ab49292fa6c34f37deffc.exe
    "C:\Users\Admin\AppData\Local\Temp\7dac01b2ac7ade6f6040d9e4fbc5dce13fd3a894539ab49292fa6c34f37deffc.exe"
    1⤵
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1204

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1204-54-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/1204-55-0x0000000076BA1000-0x0000000076BA3000-memory.dmp

    Filesize

    8KB

  • memory/1204-56-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB

  • memory/1204-57-0x0000000000400000-0x0000000000667000-memory.dmp

    Filesize

    2.4MB