Analysis
-
max time kernel
40s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 06:50
Behavioral task
behavioral1
Sample
dee0020e745a6bd0eb21c46136e9573502ec8e3e9f785a99f3a3a6936c53b7be.exe
Resource
win7-20220812-en
General
-
Target
dee0020e745a6bd0eb21c46136e9573502ec8e3e9f785a99f3a3a6936c53b7be.exe
-
Size
1.8MB
-
MD5
264df844abb71f9a049a52fe119a12d6
-
SHA1
8fd1ff9fce8a02a4b5b434e67bd02d268ca0b955
-
SHA256
dee0020e745a6bd0eb21c46136e9573502ec8e3e9f785a99f3a3a6936c53b7be
-
SHA512
ac8c8faec9e7a311b14d30b4849ef725aa77d406c082078ca23c9415e2275fba30a58dcd2c0929bccece976b161d3bb006a3c91d916df8ad85d49cf4d3689300
-
SSDEEP
49152:ZGR0ojUWvEtjD85JoQFbbKLT9f7B9BZW4Oj1:Zw00UaQDSJoQFXKLT9TB9Bw1
Malware Config
Signatures
-
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
dee0020e745a6bd0eb21c46136e9573502ec8e3e9f785a99f3a3a6936c53b7be.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Wine dee0020e745a6bd0eb21c46136e9573502ec8e3e9f785a99f3a3a6936c53b7be.exe -
Processes:
resource yara_rule behavioral1/memory/1140-54-0x0000000000400000-0x00000000005CC000-memory.dmp themida behavioral1/memory/1140-56-0x0000000000400000-0x00000000005CC000-memory.dmp themida behavioral1/memory/1140-61-0x0000000000400000-0x00000000005CC000-memory.dmp themida -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
dee0020e745a6bd0eb21c46136e9573502ec8e3e9f785a99f3a3a6936c53b7be.exepid process 1140 dee0020e745a6bd0eb21c46136e9573502ec8e3e9f785a99f3a3a6936c53b7be.exe 1140 dee0020e745a6bd0eb21c46136e9573502ec8e3e9f785a99f3a3a6936c53b7be.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
dee0020e745a6bd0eb21c46136e9573502ec8e3e9f785a99f3a3a6936c53b7be.exedescription pid process target process PID 1140 wrote to memory of 1256 1140 dee0020e745a6bd0eb21c46136e9573502ec8e3e9f785a99f3a3a6936c53b7be.exe Explorer.EXE PID 1140 wrote to memory of 1256 1140 dee0020e745a6bd0eb21c46136e9573502ec8e3e9f785a99f3a3a6936c53b7be.exe Explorer.EXE PID 1140 wrote to memory of 1256 1140 dee0020e745a6bd0eb21c46136e9573502ec8e3e9f785a99f3a3a6936c53b7be.exe Explorer.EXE PID 1140 wrote to memory of 1256 1140 dee0020e745a6bd0eb21c46136e9573502ec8e3e9f785a99f3a3a6936c53b7be.exe Explorer.EXE PID 1140 wrote to memory of 1256 1140 dee0020e745a6bd0eb21c46136e9573502ec8e3e9f785a99f3a3a6936c53b7be.exe Explorer.EXE PID 1140 wrote to memory of 1256 1140 dee0020e745a6bd0eb21c46136e9573502ec8e3e9f785a99f3a3a6936c53b7be.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\dee0020e745a6bd0eb21c46136e9573502ec8e3e9f785a99f3a3a6936c53b7be.exe"C:\Users\Admin\AppData\Local\Temp\dee0020e745a6bd0eb21c46136e9573502ec8e3e9f785a99f3a3a6936c53b7be.exe"2⤵
- Identifies Wine through registry keys
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1140-54-0x0000000000400000-0x00000000005CC000-memory.dmpFilesize
1.8MB
-
memory/1140-55-0x0000000075F51000-0x0000000075F53000-memory.dmpFilesize
8KB
-
memory/1140-56-0x0000000000400000-0x00000000005CC000-memory.dmpFilesize
1.8MB
-
memory/1140-57-0x0000000010000000-0x0000000010011000-memory.dmpFilesize
68KB
-
memory/1140-61-0x0000000000400000-0x00000000005CC000-memory.dmpFilesize
1.8MB
-
memory/1256-58-0x000000007EFC0000-0x000000007EFC6000-memory.dmpFilesize
24KB