Analysis
-
max time kernel
166s -
max time network
211s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02-12-2022 21:25
Behavioral task
behavioral1
Sample
86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe
Resource
win7-20221111-en
General
-
Target
86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe
-
Size
2.1MB
-
MD5
cea81ff610a60c5d610cbb560f3ac11c
-
SHA1
3c156b23350bb3aeb792b34501e4451f378c867e
-
SHA256
86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331
-
SHA512
c431645c2ec3749f7cbe49737772efab5b4c5ece382babd15a679fb9605c5f4eda56f2c7377bf2cd2ef21eafdf8c2f2b713882ff9f7fe05740e4f947a2a27919
-
SSDEEP
24576:++EcNtJQgTwgdBRjutVZwkjSaXdxnWLGxHuLAaBmvlCUDUSqf88oG7MiRh68MiCb:FNHbTxkhWLwH+38vxgDaN3CN+
Malware Config
Signatures
-
Modifies security service 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" reg.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Wine 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe -
Loads dropped DLL 4 IoCs
pid Process 2040 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe 2040 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe 2040 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe 2040 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe -
resource yara_rule behavioral1/memory/2040-54-0x0000000000400000-0x0000000000887000-memory.dmp themida behavioral1/memory/2040-57-0x0000000000400000-0x0000000000887000-memory.dmp themida behavioral1/memory/2040-58-0x0000000000400000-0x0000000000887000-memory.dmp themida behavioral1/memory/2040-75-0x0000000000400000-0x0000000000887000-memory.dmp themida -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundDriver.exe = "C:\\WINDOWS\\system32\\explorer.exe" 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\MSWINSCK.OCX 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2040 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\CurVer 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Version\ = "1.0" 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\Version = "1.0" 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\Version = "1.0" 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\Version = "1.0" 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\CurVer\ = "MSWinsock.Winsock.1" 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\MiscStatus 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D}\ = "Winsock General Property Page Object" 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ = "Microsoft WinSock Control, version 6.0" 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32\ = "C:\\Windows\\SysWow64\\MSWINSCK.OCX" 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\MiscStatus\ = "0" 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock.1\CLSID 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ProgID 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\MiscStatus\1 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D} 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\FLAGS\ = "2" 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\MSWINSCK.OCX" 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock.1 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Programmable 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\HELPDIR 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32\ThreadingModel = "Apartment" 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\VersionIndependentProgID 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\ = "Microsoft Winsock Control 6.0" 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\VersionIndependentProgID\ = "MSWinsock.Winsock" 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ProgID\ = "MSWinsock.Winsock.1" 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D} 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ = "DMSWinsockControlEvents" 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{0DE86A57-2BAA-11CF-A229-00AA003D7352} 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D} 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ = "IMSWinsockControl" 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\ = "Microsoft WinSock Control, version 6.0" 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\MiscStatus\1\ = "132497" 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{0DE86A52-2BAA-11CF-A229-00AA003D7352} 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\0\win32 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\HELPDIR\ 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\Version = "1.0" 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Control 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{40FC6ED4-2438-11CF-A3DB-080036F12502} 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ = "DMSWinsockControlEvents" 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\CLSID 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock.1\CLSID\ = "{248DD896-BB45-11CF-9ABC-0080C7E7B78D}" 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Version 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D} 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\0 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D} 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\FLAGS 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2040 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2040 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1904 2040 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe 28 PID 2040 wrote to memory of 1904 2040 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe 28 PID 2040 wrote to memory of 1904 2040 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe 28 PID 2040 wrote to memory of 1904 2040 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe 28 PID 2040 wrote to memory of 2012 2040 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe 29 PID 2040 wrote to memory of 2012 2040 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe 29 PID 2040 wrote to memory of 2012 2040 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe 29 PID 2040 wrote to memory of 2012 2040 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe 29 PID 2040 wrote to memory of 1112 2040 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe 32 PID 2040 wrote to memory of 1112 2040 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe 32 PID 2040 wrote to memory of 1112 2040 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe 32 PID 2040 wrote to memory of 1112 2040 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe 32 PID 2040 wrote to memory of 856 2040 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe 34 PID 2040 wrote to memory of 856 2040 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe 34 PID 2040 wrote to memory of 856 2040 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe 34 PID 2040 wrote to memory of 856 2040 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe 34 PID 2040 wrote to memory of 1068 2040 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe 35 PID 2040 wrote to memory of 1068 2040 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe 35 PID 2040 wrote to memory of 1068 2040 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe 35 PID 2040 wrote to memory of 1068 2040 86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe 35 PID 1904 wrote to memory of 1072 1904 cmd.exe 41 PID 1904 wrote to memory of 1072 1904 cmd.exe 41 PID 1904 wrote to memory of 1072 1904 cmd.exe 41 PID 1904 wrote to memory of 1072 1904 cmd.exe 41 PID 2012 wrote to memory of 904 2012 cmd.exe 40 PID 2012 wrote to memory of 904 2012 cmd.exe 40 PID 2012 wrote to memory of 904 2012 cmd.exe 40 PID 2012 wrote to memory of 904 2012 cmd.exe 40 PID 1068 wrote to memory of 1476 1068 cmd.exe 39 PID 1068 wrote to memory of 1476 1068 cmd.exe 39 PID 1068 wrote to memory of 1476 1068 cmd.exe 39 PID 1068 wrote to memory of 1476 1068 cmd.exe 39 PID 856 wrote to memory of 1704 856 cmd.exe 38 PID 856 wrote to memory of 1704 856 cmd.exe 38 PID 856 wrote to memory of 1704 856 cmd.exe 38 PID 856 wrote to memory of 1704 856 cmd.exe 38 PID 1072 wrote to memory of 764 1072 net.exe 43 PID 1072 wrote to memory of 764 1072 net.exe 43 PID 1072 wrote to memory of 764 1072 net.exe 43 PID 1072 wrote to memory of 764 1072 net.exe 43 PID 904 wrote to memory of 1964 904 net.exe 42 PID 904 wrote to memory of 1964 904 net.exe 42 PID 904 wrote to memory of 1964 904 net.exe 42 PID 904 wrote to memory of 1964 904 net.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe"C:\Users\Admin\AppData\Local\Temp\86335b1a4569b3c541ab4b8700b9619d7656377e2782cedc33a61f1aa71df331.exe"1⤵
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop "Security Center"2⤵
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\net.exenet stop "Security Center"3⤵
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"4⤵PID:764
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop SharedAccess2⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵PID:1964
-
-
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess" /v Start /t REG_DWORD /d 0x4 /f2⤵PID:1112
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /v Start /t REG_DWORD /d 0x4 /f2⤵
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\wuauserv" /v Start /t REG_DWORD /d 0x4 /f3⤵
- Modifies security service
PID:1704
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c reg add "HKLM\SYSTEM\CurrentControlSet\Services\wscsvc" /v Start /t REG_DWORD /d 0x4 /f2⤵
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Services\wscsvc" /v Start /t REG_DWORD /d 0x4 /f3⤵
- Modifies security service
PID:1476
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD59484c04258830aa3c2f2a70eb041414c
SHA1b242a4fb0e9dcf14cb51dc36027baff9a79cb823
SHA256bf7e47c16d7e1c0e88534f4ef95e09d0fd821ed1a06b0d95a389b35364b63ff5
SHA5129d0e9f0d88594746ba41ea4a61a53498619eda596e12d8ec37d01cfe8ceb08be13e3727c83d630a6d9e6d03066f62444bb94ea5a0d2ed9d21a270e612db532a0
-
Filesize
105KB
MD59484c04258830aa3c2f2a70eb041414c
SHA1b242a4fb0e9dcf14cb51dc36027baff9a79cb823
SHA256bf7e47c16d7e1c0e88534f4ef95e09d0fd821ed1a06b0d95a389b35364b63ff5
SHA5129d0e9f0d88594746ba41ea4a61a53498619eda596e12d8ec37d01cfe8ceb08be13e3727c83d630a6d9e6d03066f62444bb94ea5a0d2ed9d21a270e612db532a0
-
Filesize
105KB
MD59484c04258830aa3c2f2a70eb041414c
SHA1b242a4fb0e9dcf14cb51dc36027baff9a79cb823
SHA256bf7e47c16d7e1c0e88534f4ef95e09d0fd821ed1a06b0d95a389b35364b63ff5
SHA5129d0e9f0d88594746ba41ea4a61a53498619eda596e12d8ec37d01cfe8ceb08be13e3727c83d630a6d9e6d03066f62444bb94ea5a0d2ed9d21a270e612db532a0
-
Filesize
105KB
MD59484c04258830aa3c2f2a70eb041414c
SHA1b242a4fb0e9dcf14cb51dc36027baff9a79cb823
SHA256bf7e47c16d7e1c0e88534f4ef95e09d0fd821ed1a06b0d95a389b35364b63ff5
SHA5129d0e9f0d88594746ba41ea4a61a53498619eda596e12d8ec37d01cfe8ceb08be13e3727c83d630a6d9e6d03066f62444bb94ea5a0d2ed9d21a270e612db532a0