Analysis
-
max time kernel
118s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 00:13
Static task
static1
Behavioral task
behavioral1
Sample
0825cde4201def2377c91aa358ac032f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0825cde4201def2377c91aa358ac032f.exe
Resource
win10v2004-20231215-en
General
-
Target
0825cde4201def2377c91aa358ac032f.exe
-
Size
1.9MB
-
MD5
0825cde4201def2377c91aa358ac032f
-
SHA1
47cc2333e6a1fd68747e78efa64f29ce1f717fa0
-
SHA256
d6421cc4b2b9be4adc199425ec171295ed41e8404c905a2bc97926f212e63f44
-
SHA512
ad468ee84240342aa25bc7a11b3e13579b65261c78853588845df29ee6da60329e16009baa66ab1f49be6cec051c3b845ab97a659fe8547120555636cfd4d7c7
-
SSDEEP
49152:J86Aq4etPOPczjNIV9ivI3lH13BlIEc2M0:J8tq4etPOUzJIvdP3BSQ
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2932 temp.exe 1788 temp.exe 1964 temp.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1268429524-3929314613-1992311491-1000\Software\Wine 0825cde4201def2377c91aa358ac032f.exe -
Loads dropped DLL 4 IoCs
pid Process 1080 0825cde4201def2377c91aa358ac032f.exe 1080 0825cde4201def2377c91aa358ac032f.exe 2932 temp.exe 1788 temp.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2932 set thread context of 1788 2932 temp.exe 30 PID 1788 set thread context of 1964 1788 temp.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1080 0825cde4201def2377c91aa358ac032f.exe 1964 temp.exe 1964 temp.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1080 wrote to memory of 2932 1080 0825cde4201def2377c91aa358ac032f.exe 28 PID 1080 wrote to memory of 2932 1080 0825cde4201def2377c91aa358ac032f.exe 28 PID 1080 wrote to memory of 2932 1080 0825cde4201def2377c91aa358ac032f.exe 28 PID 1080 wrote to memory of 2932 1080 0825cde4201def2377c91aa358ac032f.exe 28 PID 2932 wrote to memory of 1788 2932 temp.exe 30 PID 2932 wrote to memory of 1788 2932 temp.exe 30 PID 2932 wrote to memory of 1788 2932 temp.exe 30 PID 2932 wrote to memory of 1788 2932 temp.exe 30 PID 2932 wrote to memory of 1788 2932 temp.exe 30 PID 2932 wrote to memory of 1788 2932 temp.exe 30 PID 2932 wrote to memory of 1788 2932 temp.exe 30 PID 2932 wrote to memory of 1788 2932 temp.exe 30 PID 2932 wrote to memory of 1788 2932 temp.exe 30 PID 2932 wrote to memory of 1788 2932 temp.exe 30 PID 2932 wrote to memory of 1788 2932 temp.exe 30 PID 2932 wrote to memory of 1788 2932 temp.exe 30 PID 1788 wrote to memory of 1964 1788 temp.exe 29 PID 1788 wrote to memory of 1964 1788 temp.exe 29 PID 1788 wrote to memory of 1964 1788 temp.exe 29 PID 1788 wrote to memory of 1964 1788 temp.exe 29 PID 1788 wrote to memory of 1964 1788 temp.exe 29 PID 1788 wrote to memory of 1964 1788 temp.exe 29 PID 1788 wrote to memory of 1964 1788 temp.exe 29 PID 1788 wrote to memory of 1964 1788 temp.exe 29 PID 1964 wrote to memory of 1368 1964 temp.exe 15 PID 1964 wrote to memory of 1368 1964 temp.exe 15 PID 1964 wrote to memory of 1368 1964 temp.exe 15 PID 1964 wrote to memory of 1368 1964 temp.exe 15 PID 1964 wrote to memory of 1368 1964 temp.exe 15 PID 1964 wrote to memory of 1368 1964 temp.exe 15
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\0825cde4201def2377c91aa358ac032f.exe"C:\Users\Admin\AppData\Local\Temp\0825cde4201def2377c91aa358ac032f.exe"2⤵
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\temp.exe"C:\Users\Admin\AppData\Local\Temp\temp.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\temp.exe"C:\Users\Admin\AppData\Local\Temp\temp.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1788
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\temp.exe"C:\Users\Admin\AppData\Local\Temp\temp.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
123KB
MD507d1ac6ea411f52988a83afdfa6ea589
SHA13d5c5d6834bf7fcc17b0bf5c652afa904e24dbce
SHA2568e1da771352c9d688a6bb75d737cfef50931dfd003653a1852786046eca2c1d6
SHA5124d385f42e1b97decbf6c1fce55793f9f821bd29a801b946a1473912f5c99afa2e352ffe612f7be7062328b802db3c641db2ab379eab22d604b7f9e2a74ac6476
-
Filesize
64KB
MD5a8ed6b5a84b1e88dab7189e4b98d6c4d
SHA15e766f670b3e357f6d257bfc2689e94de46c9f41
SHA256ac3bce9ebf3033298224c5c2680eaef07b759e5fb70f47383c864b63624977aa
SHA512ee8fada3152602e18ce2c72a742a7813d89d2703d8bd45e1494b791b5d8d8229b14050b4ce56168fba8fe09796f01426d297b1d9f86a2e7551fb2123987a15af
-
Filesize
61KB
MD5905d9aac63144c5e81145b304e09f206
SHA16549dab9fa24d92f4e328a6adcd10c75e767b7ac
SHA2569a14ccdffee940eb07308b84d6075028cf8b33f1b04c4b842edf516490bf6502
SHA512b86ec268995dbac2566624edb8b23f21cafd95d9ea5b08b9d152d8e01835bf8f700121c5a1ac91188baaafc043b979fb9ad5b16c44d7cf92faa9aaabee95c17b
-
Filesize
87KB
MD578855eb244ca261d2a406da0962cf565
SHA11fa15a54f0264983270a850a34349ad9895ae0cd
SHA256ed9899535ba9d1a2264ea996286d164c51433249c95db6ddc827ace77416531a
SHA512adb4251e0ce35d89cce11091595cbf9b21bc3f093577293b3e5989fba5fafb1f81ec15187aa01185c5623cfe74943e94dd75ddf0bfb49c7285c1213136df5484
-
Filesize
67KB
MD51fdb66ef7ea369e28b4769bd0022c395
SHA12ac017e55597e6a4d4e9b898f773501ee6efd8ca
SHA2565b2748ec452b7f42589216c3299324d4339e84b01c3e674cde2ee45e6edf7b74
SHA512530cc5876c49ad6c5d327ae56770527197c6033f6bb738905783a0f8147c46ab96b24575df76cebe54847dd420fab6f2a4e0d26c495e74adf6fb6bd1c83134ed
-
Filesize
364KB
MD51712218bdfbea843da95c757391784ea
SHA1a4966ccde4cac6d4a4158a1aadbc984b2292cfc5
SHA25684d1fab08ed6e34d69dcf02a1ff09be042d9dee3111a1e1b0b377f1bed25d22f
SHA512c018883bdd10b4beeeccd19c6746b82fa830d1caddcca0d0b263b971382eff4c9358be796b8778a9f88ad0bea0fa5f95bb5b8f940747a99b26f6206e183b25a3
-
Filesize
192KB
MD510443de8b523fd1023bfb6eb0fd87855
SHA1aeb86d6932466ec5c610f0c5d88e7ce50e754173
SHA256f525980318362772cca4a042a9847de878dc0fa2af16d7d502641b537eb3a186
SHA512cd58479150ab07fe41851711c9e874cb538a4ad155b0b747efb5101da1f51701265483301d9a357b4958a2255fb6c959acf382fa4a39169e8fd042e5e4c8ed83
-
Filesize
74KB
MD5b560866ffa3714dd80f8f2eac3a12d5c
SHA1d6590534de0aab7fc5fd1023a739bd89a75a9785
SHA256a373942c7cd6dbab86d0ffb91b3739ec41e58869be19bec5e258a7475d743bee
SHA512268e00f0860e191795580ac2c4b7be335b3d4b3a94b2e427283fdadf6a30b51255566563fd87bca3657404f3647ffd9b7f2836a02670083314116c14246442ff
-
Filesize
84KB
MD5db691da6039fc04b99c16ba46ec1d3f8
SHA14391721e7faca6779b0364c3f78f260e87d998b9
SHA256fd5c6bb96e11b0f4dec4b151cd089faf288931a148bedbfc471c493d49a569c5
SHA5126574562765a093bc804cc61ccb506ffc6e66f9ec63f0312bed4985ef84a551b7f91684636615714a910297e4b65efa48ac8c23978073cb9eadbb5d736d48685c