Analysis
-
max time kernel
30s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10-01-2024 05:34
Behavioral task
behavioral1
Sample
4fb7b4638c7339017fea94f19f0fb4d8.exe
Resource
win7-20231215-en
General
-
Target
4fb7b4638c7339017fea94f19f0fb4d8.exe
-
Size
1.3MB
-
MD5
4fb7b4638c7339017fea94f19f0fb4d8
-
SHA1
fdaf4ea4112c0739b7bab55b3a5258918a739cd8
-
SHA256
95f7a1337f9f8d3c1fe306a14920e1c045c52cd91152a8e457ac264fdfe69dd3
-
SHA512
0c931963b1e049c73283b13167480034b48bb3d78cbb2fb3edc409a35a82d15b25fbadc32f5f3cdda59a13de257aa9149a07fff70700dbd3b291b5834073f6b7
-
SSDEEP
24576:7CSTSXo9EgkiIQheJ8JnnKzAmXC5bzgi/yBianG2iMtTu8ucR+2ePTs11zVntLF:7CSTeYBkizQnczgi/eVGetx/R+2ePwp
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2036 wintask.exe 1804 wintask.exe 1304 wintask.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Wine wintask.exe Key opened \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Wine 4fb7b4638c7339017fea94f19f0fb4d8.exe Key opened \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Wine wintask.exe Key opened \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Wine wintask.exe -
Loads dropped DLL 6 IoCs
pid Process 1720 4fb7b4638c7339017fea94f19f0fb4d8.exe 1720 4fb7b4638c7339017fea94f19f0fb4d8.exe 2036 wintask.exe 2036 wintask.exe 1804 wintask.exe 1804 wintask.exe -
resource yara_rule behavioral1/memory/1720-51-0x0000000000400000-0x00000000006F4000-memory.dmp themida behavioral1/files/0x000a000000012251-50.dat themida behavioral1/memory/2036-35-0x0000000000400000-0x00000000006F4000-memory.dmp themida behavioral1/memory/2036-31-0x0000000000400000-0x00000000006F4000-memory.dmp themida behavioral1/memory/1720-30-0x0000000004A70000-0x0000000004D64000-memory.dmp themida behavioral1/memory/1720-6-0x0000000000400000-0x00000000006F4000-memory.dmp themida behavioral1/memory/1720-0-0x0000000000400000-0x00000000006F4000-memory.dmp themida behavioral1/memory/1804-83-0x0000000000400000-0x00000000006F4000-memory.dmp themida behavioral1/memory/1804-108-0x0000000000400000-0x00000000006F4000-memory.dmp themida behavioral1/memory/1304-135-0x0000000000400000-0x00000000006F4000-memory.dmp themida behavioral1/memory/2564-138-0x0000000000400000-0x00000000006F4000-memory.dmp themida -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wintask.exe wintask.exe File created C:\Windows\SysWOW64\wintask.exe wintask.exe File created C:\Windows\SysWOW64\wintask.exe 4fb7b4638c7339017fea94f19f0fb4d8.exe File opened for modification C:\Windows\SysWOW64\wintask.exe 4fb7b4638c7339017fea94f19f0fb4d8.exe File opened for modification C:\Windows\SysWOW64\wintask.exe wintask.exe File created C:\Windows\SysWOW64\wintask.exe wintask.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1720 4fb7b4638c7339017fea94f19f0fb4d8.exe 2036 wintask.exe 1804 wintask.exe 1304 wintask.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2036 1720 4fb7b4638c7339017fea94f19f0fb4d8.exe 15 PID 1720 wrote to memory of 2036 1720 4fb7b4638c7339017fea94f19f0fb4d8.exe 15 PID 1720 wrote to memory of 2036 1720 4fb7b4638c7339017fea94f19f0fb4d8.exe 15 PID 1720 wrote to memory of 2036 1720 4fb7b4638c7339017fea94f19f0fb4d8.exe 15 PID 2036 wrote to memory of 1804 2036 wintask.exe 29 PID 2036 wrote to memory of 1804 2036 wintask.exe 29 PID 2036 wrote to memory of 1804 2036 wintask.exe 29 PID 2036 wrote to memory of 1804 2036 wintask.exe 29 PID 1804 wrote to memory of 1304 1804 wintask.exe 30 PID 1804 wrote to memory of 1304 1804 wintask.exe 30 PID 1804 wrote to memory of 1304 1804 wintask.exe 30 PID 1804 wrote to memory of 1304 1804 wintask.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\4fb7b4638c7339017fea94f19f0fb4d8.exe"C:\Users\Admin\AppData\Local\Temp\4fb7b4638c7339017fea94f19f0fb4d8.exe"1⤵
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\wintask.exeC:\Windows\system32\wintask.exe 648 "C:\Users\Admin\AppData\Local\Temp\4fb7b4638c7339017fea94f19f0fb4d8.exe"2⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\wintask.exeC:\Windows\system32\wintask.exe 704 "C:\Windows\SysWOW64\wintask.exe"3⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\wintask.exeC:\Windows\system32\wintask.exe 708 "C:\Windows\SysWOW64\wintask.exe"4⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious behavior: EnumeratesProcesses
PID:1304 -
C:\Windows\SysWOW64\wintask.exeC:\Windows\system32\wintask.exe 716 "C:\Windows\SysWOW64\wintask.exe"5⤵PID:2564
-
C:\Windows\SysWOW64\wintask.exeC:\Windows\system32\wintask.exe 712 "C:\Windows\SysWOW64\wintask.exe"6⤵PID:1404
-
C:\Windows\SysWOW64\wintask.exeC:\Windows\system32\wintask.exe 720 "C:\Windows\SysWOW64\wintask.exe"7⤵PID:1760
-
C:\Windows\SysWOW64\wintask.exeC:\Windows\system32\wintask.exe 724 "C:\Windows\SysWOW64\wintask.exe"8⤵PID:2740
-
C:\Windows\SysWOW64\wintask.exeC:\Windows\system32\wintask.exe 736 "C:\Windows\SysWOW64\wintask.exe"9⤵PID:1320
-
C:\Windows\SysWOW64\wintask.exeC:\Windows\system32\wintask.exe 732 "C:\Windows\SysWOW64\wintask.exe"10⤵PID:2248
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD54fb7b4638c7339017fea94f19f0fb4d8
SHA1fdaf4ea4112c0739b7bab55b3a5258918a739cd8
SHA25695f7a1337f9f8d3c1fe306a14920e1c045c52cd91152a8e457ac264fdfe69dd3
SHA5120c931963b1e049c73283b13167480034b48bb3d78cbb2fb3edc409a35a82d15b25fbadc32f5f3cdda59a13de257aa9149a07fff70700dbd3b291b5834073f6b7