Analysis
-
max time kernel
193s -
max time network
208s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 19:38
Behavioral task
behavioral1
Sample
389410755c92f44709da62f5a562bc99.exe
Resource
win7-20231215-en
windows7-x64
6 signatures
150 seconds
General
-
Target
389410755c92f44709da62f5a562bc99.exe
-
Size
800KB
-
MD5
389410755c92f44709da62f5a562bc99
-
SHA1
be8b0117d0d15ccf9363ca749f84ae88b3ef40bc
-
SHA256
421f271ad2fe37b2c473b349a53d2cae63d7fcdf81a992d13d74b5e82bd0a0fa
-
SHA512
804c12f11abfa22310ed87f2392bab896463e743a5e6824449012e944feee8d384023c3532daac8406ecbe5c0b9c8d40248557424013e5730e436cb8a53d2de3
-
SSDEEP
24576:EoDDhviKtGJBpOIvW9mN9iNkOnzbCyLHy+:EoABMmN9i01+
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 389410755c92f44709da62f5a562bc99.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Wine 389410755c92f44709da62f5a562bc99.exe -
resource yara_rule behavioral2/memory/2664-0-0x0000000000400000-0x00000000004CB000-memory.dmp themida behavioral2/memory/2664-1-0x0000000000400000-0x00000000004CB000-memory.dmp themida behavioral2/memory/2664-4-0x0000000000400000-0x00000000004CB000-memory.dmp themida behavioral2/memory/2664-5-0x0000000000400000-0x00000000004CB000-memory.dmp themida behavioral2/memory/2664-6-0x0000000000400000-0x00000000004CB000-memory.dmp themida behavioral2/memory/2664-12-0x0000000000400000-0x00000000004CB000-memory.dmp themida -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2664 389410755c92f44709da62f5a562bc99.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2664 389410755c92f44709da62f5a562bc99.exe 2664 389410755c92f44709da62f5a562bc99.exe 2664 389410755c92f44709da62f5a562bc99.exe 2664 389410755c92f44709da62f5a562bc99.exe 2664 389410755c92f44709da62f5a562bc99.exe 2664 389410755c92f44709da62f5a562bc99.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2664 wrote to memory of 3464 2664 389410755c92f44709da62f5a562bc99.exe 54 PID 2664 wrote to memory of 3464 2664 389410755c92f44709da62f5a562bc99.exe 54 PID 2664 wrote to memory of 3464 2664 389410755c92f44709da62f5a562bc99.exe 54 PID 2664 wrote to memory of 3464 2664 389410755c92f44709da62f5a562bc99.exe 54
Processes
-
C:\Users\Admin\AppData\Local\Temp\389410755c92f44709da62f5a562bc99.exe"C:\Users\Admin\AppData\Local\Temp\389410755c92f44709da62f5a562bc99.exe"1⤵
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2664
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3464