Analysis
-
max time kernel
41s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 10:32
Behavioral task
behavioral1
Sample
a17019b4d624a8bbfe80235883500d5dfa66ffb63432628c4800b25fb5712725.exe
Resource
win7-20221111-en
windows7-x64
5 signatures
150 seconds
General
-
Target
a17019b4d624a8bbfe80235883500d5dfa66ffb63432628c4800b25fb5712725.exe
-
Size
656KB
-
MD5
24f01f958906e3edcacb181c1e9870c4
-
SHA1
0e9d526ff8f048d632149f4db4c3b8b5b530ab76
-
SHA256
a17019b4d624a8bbfe80235883500d5dfa66ffb63432628c4800b25fb5712725
-
SHA512
bd65f11596fcf03c83e4f42b566bf01deca2adf98a24ca881383fe07b6148707fc3674b0d3a06987b7bf869bd783ef5a3aef376f9595fdfb48be08249f9f4955
-
SSDEEP
12288:dXg/+79LUCkI7qLwUa5q/5irZavKiyaM/d/XXCvINXHx1ZAkR:3LGIekb5Qnyi65NXRzbR
Malware Config
Signatures
-
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Wine a17019b4d624a8bbfe80235883500d5dfa66ffb63432628c4800b25fb5712725.exe -
resource yara_rule behavioral1/memory/956-55-0x0000000000400000-0x000000000056D000-memory.dmp themida behavioral1/memory/956-60-0x0000000000400000-0x000000000056D000-memory.dmp themida -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 956 a17019b4d624a8bbfe80235883500d5dfa66ffb63432628c4800b25fb5712725.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 956 a17019b4d624a8bbfe80235883500d5dfa66ffb63432628c4800b25fb5712725.exe 956 a17019b4d624a8bbfe80235883500d5dfa66ffb63432628c4800b25fb5712725.exe 956 a17019b4d624a8bbfe80235883500d5dfa66ffb63432628c4800b25fb5712725.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 956 wrote to memory of 1284 956 a17019b4d624a8bbfe80235883500d5dfa66ffb63432628c4800b25fb5712725.exe 11 PID 956 wrote to memory of 1284 956 a17019b4d624a8bbfe80235883500d5dfa66ffb63432628c4800b25fb5712725.exe 11 PID 956 wrote to memory of 1284 956 a17019b4d624a8bbfe80235883500d5dfa66ffb63432628c4800b25fb5712725.exe 11 PID 956 wrote to memory of 1284 956 a17019b4d624a8bbfe80235883500d5dfa66ffb63432628c4800b25fb5712725.exe 11 PID 956 wrote to memory of 1284 956 a17019b4d624a8bbfe80235883500d5dfa66ffb63432628c4800b25fb5712725.exe 11 PID 956 wrote to memory of 1284 956 a17019b4d624a8bbfe80235883500d5dfa66ffb63432628c4800b25fb5712725.exe 11
Processes
-
C:\Users\Admin\AppData\Local\Temp\a17019b4d624a8bbfe80235883500d5dfa66ffb63432628c4800b25fb5712725.exe"C:\Users\Admin\AppData\Local\Temp\a17019b4d624a8bbfe80235883500d5dfa66ffb63432628c4800b25fb5712725.exe"1⤵
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:956
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1284