Analysis
-
max time kernel
152s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 11:22
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
6a733a8b36b3e0a8fca4323e1b955387.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
General
-
Target
6a733a8b36b3e0a8fca4323e1b955387.exe
-
Size
2.7MB
-
MD5
6a733a8b36b3e0a8fca4323e1b955387
-
SHA1
c333a5075249960d2f453f22a474974d16e0f4ed
-
SHA256
7dd1c202c09404a17552b08f547eba851a208cefa4e1ec7e0a049508af5970be
-
SHA512
cdfa9d6c7aafd674e5610061bd5747f67bfabd147202103edb600461c0c8a56b621bdbc3512d19b839d2184299e17211e132ee04ccdb5e7a2e4922fd22b4286d
-
SSDEEP
49152:gnrnTbaE5xNVh7dAuc6jO+i/LxgY5rhvofdbcR5hW:gW6NVhpi6K+6iibhW
Malware Config
Signatures
-
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Software\Wine 6a733a8b36b3e0a8fca4323e1b955387.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 6a733a8b36b3e0a8fca4323e1b955387.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2636 6a733a8b36b3e0a8fca4323e1b955387.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2636 6a733a8b36b3e0a8fca4323e1b955387.exe 2636 6a733a8b36b3e0a8fca4323e1b955387.exe 2636 6a733a8b36b3e0a8fca4323e1b955387.exe 2636 6a733a8b36b3e0a8fca4323e1b955387.exe 2636 6a733a8b36b3e0a8fca4323e1b955387.exe 2636 6a733a8b36b3e0a8fca4323e1b955387.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2636 wrote to memory of 3368 2636 6a733a8b36b3e0a8fca4323e1b955387.exe 47 PID 2636 wrote to memory of 3368 2636 6a733a8b36b3e0a8fca4323e1b955387.exe 47 PID 2636 wrote to memory of 3368 2636 6a733a8b36b3e0a8fca4323e1b955387.exe 47 PID 2636 wrote to memory of 3368 2636 6a733a8b36b3e0a8fca4323e1b955387.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a733a8b36b3e0a8fca4323e1b955387.exe"C:\Users\Admin\AppData\Local\Temp\6a733a8b36b3e0a8fca4323e1b955387.exe"1⤵
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2636
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3368