Analysis
-
max time kernel
45s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 03:53
Static task
static1
Behavioral task
behavioral1
Sample
3bd189fa981a2c4c493a6689a0c4405e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3bd189fa981a2c4c493a6689a0c4405e.exe
Resource
win10v2004-20231215-en
General
-
Target
3bd189fa981a2c4c493a6689a0c4405e.exe
-
Size
424KB
-
MD5
3bd189fa981a2c4c493a6689a0c4405e
-
SHA1
f1d5a5c54c241c8b899fdaee9199221faf8d55db
-
SHA256
700762ce4332608df6077f688e52a6f173b44f27d55b8ad9b94373f58b604f8b
-
SHA512
4fd48d1d09238c6a81958b2999d3774a8927458c3174bb1526577636120d93626f4aeef7c615105e57359d72ad718b4fc0fd96f6b0c0b6b4316ffb631813d1fd
-
SSDEEP
12288:XTpKfPdYo/zz/3ZHSCMvsl2mnlnOVRPMRG:alJ/xSCM0HZlRG
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1724 msn.exe 2280 msn.exe 2084 msn.exe 576 msn.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Wine 3bd189fa981a2c4c493a6689a0c4405e.exe Key opened \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Wine msn.exe Key opened \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Wine msn.exe Key opened \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Wine msn.exe Key opened \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Wine msn.exe -
Loads dropped DLL 8 IoCs
pid Process 2028 3bd189fa981a2c4c493a6689a0c4405e.exe 2028 3bd189fa981a2c4c493a6689a0c4405e.exe 1724 msn.exe 1724 msn.exe 2280 msn.exe 2280 msn.exe 2084 msn.exe 2084 msn.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\msn.exe msn.exe File created C:\Windows\SysWOW64\msn.exe msn.exe File opened for modification C:\Windows\SysWOW64\msn.exe msn.exe File created C:\Windows\SysWOW64\msn.exe msn.exe File opened for modification C:\Windows\SysWOW64\msn.exe msn.exe File created C:\Windows\SysWOW64\msn.exe msn.exe File created C:\Windows\SysWOW64\msn.exe 3bd189fa981a2c4c493a6689a0c4405e.exe File opened for modification C:\Windows\SysWOW64\msn.exe 3bd189fa981a2c4c493a6689a0c4405e.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2028 wrote to memory of 1724 2028 3bd189fa981a2c4c493a6689a0c4405e.exe 15 PID 2028 wrote to memory of 1724 2028 3bd189fa981a2c4c493a6689a0c4405e.exe 15 PID 2028 wrote to memory of 1724 2028 3bd189fa981a2c4c493a6689a0c4405e.exe 15 PID 2028 wrote to memory of 1724 2028 3bd189fa981a2c4c493a6689a0c4405e.exe 15 PID 1724 wrote to memory of 2280 1724 msn.exe 29 PID 1724 wrote to memory of 2280 1724 msn.exe 29 PID 1724 wrote to memory of 2280 1724 msn.exe 29 PID 1724 wrote to memory of 2280 1724 msn.exe 29 PID 2280 wrote to memory of 2084 2280 msn.exe 30 PID 2280 wrote to memory of 2084 2280 msn.exe 30 PID 2280 wrote to memory of 2084 2280 msn.exe 30 PID 2280 wrote to memory of 2084 2280 msn.exe 30 PID 2084 wrote to memory of 576 2084 msn.exe 31 PID 2084 wrote to memory of 576 2084 msn.exe 31 PID 2084 wrote to memory of 576 2084 msn.exe 31 PID 2084 wrote to memory of 576 2084 msn.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3bd189fa981a2c4c493a6689a0c4405e.exe"C:\Users\Admin\AppData\Local\Temp\3bd189fa981a2c4c493a6689a0c4405e.exe"1⤵
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\msn.exeC:\Windows\system32\msn.exe 656 "C:\Users\Admin\AppData\Local\Temp\3bd189fa981a2c4c493a6689a0c4405e.exe"2⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\msn.exeC:\Windows\system32\msn.exe 696 "C:\Windows\SysWOW64\msn.exe"3⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\msn.exeC:\Windows\system32\msn.exe 688 "C:\Windows\SysWOW64\msn.exe"4⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\msn.exeC:\Windows\system32\msn.exe 700 "C:\Windows\SysWOW64\msn.exe"5⤵
- Executes dropped EXE
- Identifies Wine through registry keys
PID:576 -
C:\Windows\SysWOW64\msn.exeC:\Windows\system32\msn.exe 704 "C:\Windows\SysWOW64\msn.exe"6⤵PID:3020
-
C:\Windows\SysWOW64\msn.exeC:\Windows\system32\msn.exe 712 "C:\Windows\SysWOW64\msn.exe"7⤵PID:2816
-
C:\Windows\SysWOW64\msn.exeC:\Windows\system32\msn.exe 716 "C:\Windows\SysWOW64\msn.exe"8⤵PID:2564
-
C:\Windows\SysWOW64\msn.exeC:\Windows\system32\msn.exe 708 "C:\Windows\SysWOW64\msn.exe"9⤵PID:1868
-
C:\Windows\SysWOW64\msn.exeC:\Windows\system32\msn.exe 720 "C:\Windows\SysWOW64\msn.exe"10⤵PID:2472
-
C:\Windows\SysWOW64\msn.exeC:\Windows\system32\msn.exe 724 "C:\Windows\SysWOW64\msn.exe"11⤵PID:980
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
424KB
MD53bd189fa981a2c4c493a6689a0c4405e
SHA1f1d5a5c54c241c8b899fdaee9199221faf8d55db
SHA256700762ce4332608df6077f688e52a6f173b44f27d55b8ad9b94373f58b604f8b
SHA5124fd48d1d09238c6a81958b2999d3774a8927458c3174bb1526577636120d93626f4aeef7c615105e57359d72ad718b4fc0fd96f6b0c0b6b4316ffb631813d1fd