Analysis
-
max time kernel
30s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 14:48
Behavioral task
behavioral1
Sample
bcd1f5b1c66b0b1fb54e3969ebcea7221a3c22a43c6bcfed8413ede371064fe8.exe
Resource
win7-20221111-en
windows7-x64
4 signatures
150 seconds
General
-
Target
bcd1f5b1c66b0b1fb54e3969ebcea7221a3c22a43c6bcfed8413ede371064fe8.exe
-
Size
2.0MB
-
MD5
cf851eb0e6c0b114088a742b78600d3c
-
SHA1
13add338b590101c1d09dd7a13fa73736903aba4
-
SHA256
bcd1f5b1c66b0b1fb54e3969ebcea7221a3c22a43c6bcfed8413ede371064fe8
-
SHA512
1283fd324d1be574ee3602a7d776180d54b83dfa86a81a59ce1ede7c0c9dfb465c230ab49ea91f2ab44a40289e72eaefb86265b18f03241f1617893fc0627eb3
-
SSDEEP
49152:6F2QI0hvNRXTwahxcuJtvjXX+sQt0VGdTvktTsoDVWAh2K:q2QIa/jPJXX+sQtnLk5XDth2K
Malware Config
Signatures
-
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Wine bcd1f5b1c66b0b1fb54e3969ebcea7221a3c22a43c6bcfed8413ede371064fe8.exe -
resource yara_rule behavioral1/memory/1232-54-0x0000000000400000-0x0000000000563000-memory.dmp themida behavioral1/memory/1232-55-0x0000000000400000-0x0000000000563000-memory.dmp themida -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1232 bcd1f5b1c66b0b1fb54e3969ebcea7221a3c22a43c6bcfed8413ede371064fe8.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1232 bcd1f5b1c66b0b1fb54e3969ebcea7221a3c22a43c6bcfed8413ede371064fe8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bcd1f5b1c66b0b1fb54e3969ebcea7221a3c22a43c6bcfed8413ede371064fe8.exe"C:\Users\Admin\AppData\Local\Temp\bcd1f5b1c66b0b1fb54e3969ebcea7221a3c22a43c6bcfed8413ede371064fe8.exe"1⤵
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1232