Analysis
-
max time kernel
210s -
max time network
250s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 00:21
Static task
static1
Behavioral task
behavioral1
Sample
137c77733b784e0b71cf036ae94d28dbde2c75e23e41611854673f0ece187ebd.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
137c77733b784e0b71cf036ae94d28dbde2c75e23e41611854673f0ece187ebd.exe
Resource
win10v2004-20221111-en
General
-
Target
137c77733b784e0b71cf036ae94d28dbde2c75e23e41611854673f0ece187ebd.exe
-
Size
284KB
-
MD5
2b86e41c47a73965f31071e9f823a6c5
-
SHA1
2eeb0f495049d2b17aa7b56fb805afc3e41d722d
-
SHA256
137c77733b784e0b71cf036ae94d28dbde2c75e23e41611854673f0ece187ebd
-
SHA512
0df345740ff30b1c75e3c66c7bfd84b8ee914ab7d635741c2e0117178412f7145fc23dcf2a5f9becd2643d3c929c31020bbb3621cee5baa9742a0f15751511cd
-
SSDEEP
6144:205XASk3NyyIk88dxDxQLVlZAYvRQYThzAZ/x40X2:2gkQyU6xuZ0pCUZrG
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 976 feve.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\WINE feve.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\WINE feve.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Windows\Currentversion\Run feve.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Mekeo = "C:\\Users\\Admin\\AppData\\Roaming\\Uvywwy\\feve.exe" feve.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4668 set thread context of 4160 4668 137c77733b784e0b71cf036ae94d28dbde2c75e23e41611854673f0ece187ebd.exe 86 -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 137c77733b784e0b71cf036ae94d28dbde2c75e23e41611854673f0ece187ebd.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\Software\Microsoft\Internet Explorer\Privacy 137c77733b784e0b71cf036ae94d28dbde2c75e23e41611854673f0ece187ebd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe 976 feve.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 4668 137c77733b784e0b71cf036ae94d28dbde2c75e23e41611854673f0ece187ebd.exe Token: SeSecurityPrivilege 4668 137c77733b784e0b71cf036ae94d28dbde2c75e23e41611854673f0ece187ebd.exe Token: SeSecurityPrivilege 4668 137c77733b784e0b71cf036ae94d28dbde2c75e23e41611854673f0ece187ebd.exe Token: SeSecurityPrivilege 4668 137c77733b784e0b71cf036ae94d28dbde2c75e23e41611854673f0ece187ebd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4668 wrote to memory of 976 4668 137c77733b784e0b71cf036ae94d28dbde2c75e23e41611854673f0ece187ebd.exe 84 PID 4668 wrote to memory of 976 4668 137c77733b784e0b71cf036ae94d28dbde2c75e23e41611854673f0ece187ebd.exe 84 PID 4668 wrote to memory of 976 4668 137c77733b784e0b71cf036ae94d28dbde2c75e23e41611854673f0ece187ebd.exe 84 PID 976 wrote to memory of 2700 976 feve.exe 38 PID 976 wrote to memory of 2700 976 feve.exe 38 PID 976 wrote to memory of 2700 976 feve.exe 38 PID 976 wrote to memory of 2700 976 feve.exe 38 PID 976 wrote to memory of 2700 976 feve.exe 38 PID 976 wrote to memory of 2836 976 feve.exe 37 PID 976 wrote to memory of 2836 976 feve.exe 37 PID 976 wrote to memory of 2836 976 feve.exe 37 PID 976 wrote to memory of 2836 976 feve.exe 37 PID 976 wrote to memory of 2836 976 feve.exe 37 PID 976 wrote to memory of 2872 976 feve.exe 36 PID 976 wrote to memory of 2872 976 feve.exe 36 PID 976 wrote to memory of 2872 976 feve.exe 36 PID 976 wrote to memory of 2872 976 feve.exe 36 PID 976 wrote to memory of 2872 976 feve.exe 36 PID 976 wrote to memory of 2492 976 feve.exe 35 PID 976 wrote to memory of 2492 976 feve.exe 35 PID 976 wrote to memory of 2492 976 feve.exe 35 PID 976 wrote to memory of 2492 976 feve.exe 35 PID 976 wrote to memory of 2492 976 feve.exe 35 PID 976 wrote to memory of 776 976 feve.exe 34 PID 976 wrote to memory of 776 976 feve.exe 34 PID 976 wrote to memory of 776 976 feve.exe 34 PID 976 wrote to memory of 776 976 feve.exe 34 PID 976 wrote to memory of 776 976 feve.exe 34 PID 976 wrote to memory of 3232 976 feve.exe 33 PID 976 wrote to memory of 3232 976 feve.exe 33 PID 976 wrote to memory of 3232 976 feve.exe 33 PID 976 wrote to memory of 3232 976 feve.exe 33 PID 976 wrote to memory of 3232 976 feve.exe 33 PID 976 wrote to memory of 3340 976 feve.exe 32 PID 976 wrote to memory of 3340 976 feve.exe 32 PID 976 wrote to memory of 3340 976 feve.exe 32 PID 976 wrote to memory of 3340 976 feve.exe 32 PID 976 wrote to memory of 3340 976 feve.exe 32 PID 976 wrote to memory of 3408 976 feve.exe 31 PID 976 wrote to memory of 3408 976 feve.exe 31 PID 976 wrote to memory of 3408 976 feve.exe 31 PID 976 wrote to memory of 3408 976 feve.exe 31 PID 976 wrote to memory of 3408 976 feve.exe 31 PID 976 wrote to memory of 3508 976 feve.exe 30 PID 976 wrote to memory of 3508 976 feve.exe 30 PID 976 wrote to memory of 3508 976 feve.exe 30 PID 976 wrote to memory of 3508 976 feve.exe 30 PID 976 wrote to memory of 3508 976 feve.exe 30 PID 976 wrote to memory of 3740 976 feve.exe 29 PID 976 wrote to memory of 3740 976 feve.exe 29 PID 976 wrote to memory of 3740 976 feve.exe 29 PID 976 wrote to memory of 3740 976 feve.exe 29 PID 976 wrote to memory of 3740 976 feve.exe 29 PID 976 wrote to memory of 4920 976 feve.exe 26 PID 976 wrote to memory of 4920 976 feve.exe 26 PID 976 wrote to memory of 4920 976 feve.exe 26 PID 976 wrote to memory of 4920 976 feve.exe 26 PID 976 wrote to memory of 4920 976 feve.exe 26 PID 976 wrote to memory of 4592 976 feve.exe 11 PID 976 wrote to memory of 4592 976 feve.exe 11 PID 976 wrote to memory of 4592 976 feve.exe 11 PID 976 wrote to memory of 4364 976 feve.exe 9 PID 976 wrote to memory of 4364 976 feve.exe 9 PID 976 wrote to memory of 4364 976 feve.exe 9
Processes
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4364
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:4592
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4920
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3740
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3508
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3408
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3340
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3232
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:776
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\137c77733b784e0b71cf036ae94d28dbde2c75e23e41611854673f0ece187ebd.exe"C:\Users\Admin\AppData\Local\Temp\137c77733b784e0b71cf036ae94d28dbde2c75e23e41611854673f0ece187ebd.exe"2⤵
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Roaming\Uvywwy\feve.exe"C:\Users\Admin\AppData\Roaming\Uvywwy\feve.exe"3⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:976
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpc5e02f92.bat"3⤵PID:4160
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵PID:1976
-
-
-
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2872
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2836
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2700
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:748
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.11⤵PID:1272
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.11⤵PID:796
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:792
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:4648
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2888
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
437B
MD543841c5061d2c520fd3c42f29264ccbd
SHA1a99c4c84835c2ed835a9177f38f53124f16d0b93
SHA256d8b62fbbab85d2efd72239213092009bcdb6af76b07f5c52c0141961a93f60b6
SHA5128ebdd83cfefcae8ced0922b7c37ac14a55828a1014448d1b57ee30d30f240a61d28564a28eb5e12d9b4d426d15b99883b0c2ec7c9a70e082dc1c48fa0dba3179
-
Filesize
284KB
MD59cbf7fae51411e24b3858cd11bbfb3eb
SHA1815fe993469bba9f8ebb085b297b061207144782
SHA25605e706eda34bd1619c7d9f0ee2b1b43ed25081b381c92e610a1b4f0f57417505
SHA5125ca6b11b8a5420b6ec92575e474784de337d72cd08136473004123ca1e698a262f9a589ed5bf1e81d6c360d0b94d788b239ff4e5c70f8b8cd84201601966beb4
-
Filesize
284KB
MD59cbf7fae51411e24b3858cd11bbfb3eb
SHA1815fe993469bba9f8ebb085b297b061207144782
SHA25605e706eda34bd1619c7d9f0ee2b1b43ed25081b381c92e610a1b4f0f57417505
SHA5125ca6b11b8a5420b6ec92575e474784de337d72cd08136473004123ca1e698a262f9a589ed5bf1e81d6c360d0b94d788b239ff4e5c70f8b8cd84201601966beb4