Analysis

  • max time kernel
    142s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12/01/2024, 11:43

General

  • Target

    565dce884c9975a9b297c1cc7a858cca.exe

  • Size

    183KB

  • MD5

    565dce884c9975a9b297c1cc7a858cca

  • SHA1

    7539ada7c6f844c8dec0beaf7748130e0f274f10

  • SHA256

    34236e767db90d8f0754cf71e77ca17cc65a1cc5890402a532758718da03afb6

  • SHA512

    51ca735bbac617d195442fa2fd8922f1665d68012b12a7f8c44f305da57ceba2b6a885720991847e0a3aa6954ce76fc35cc98681c17d24e67a7a0cb2a43842b8

  • SSDEEP

    3072:9MSncRzAOcNb3mML5dxNqOooCoDErB0nyde/xTBLfhv:eSncRlcNbl5dLDEBAyUp

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 4 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\565dce884c9975a9b297c1cc7a858cca.exe
    "C:\Users\Admin\AppData\Local\Temp\565dce884c9975a9b297c1cc7a858cca.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2088
    • C:\Users\Admin\AppData\Local\Temp\1.EXE
      "C:\Users\Admin\AppData\Local\Temp\1.EXE"
      2⤵
      • Executes dropped EXE
      PID:3056
    • C:\Users\Admin\AppData\Local\Temp\123.EXE
      "C:\Users\Admin\AppData\Local\Temp\123.EXE"
      2⤵
      • Executes dropped EXE
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2676
      • C:\Users\Admin\AppData\Local\Temp\123.EXE
        C:\Users\Admin\AppData\Local\Temp\123.EXE
        3⤵
        • Executes dropped EXE
        PID:2852

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\1.EXE

          Filesize

          18KB

          MD5

          79e40b94e774e1ce436b328ee5c33ee9

          SHA1

          460acf7ce5bcf03a168f892f1e52c90d143e7258

          SHA256

          1f3db9f654ee52cac88b84605aa2bb22488635ba1b0a8cf9dea8c95e8a2b366a

          SHA512

          8a8806fc2ba0344b6839d42783a1f564adccfeafa50eb38b84d3c25672fcd7b070de385d1caa37fb5c340330de0c4b35a286fdf2d3513faedf813d0def31e69d

        • C:\Users\Admin\AppData\Local\Temp\123.EXE

          Filesize

          112KB

          MD5

          4d032927c61f3e001137125e558b1864

          SHA1

          ee14b3ddc41134a60741b58606eab8e31cca70b3

          SHA256

          cd559607ff3a62d8efc43296939e5d19e0921d332af5603c64f99d6f112fa1cd

          SHA512

          d3a7781d3e0cf1dee1de8d9bc07e62a1eeddacda75342920e50cc32d9f661cb54b5f06a9f1bbd61fc652753f0a8a35ab3453d757383000a5032ece069396fa8e

        • \Users\Admin\AppData\Local\Temp\123.EXE

          Filesize

          105KB

          MD5

          c2eec11957911bebac1eeacbc62a7a6e

          SHA1

          daf1069762a8036cf3966b7b6ff2509935173210

          SHA256

          e7848b2b51000fa73e84676b8cf59c8786e5fd80a66a09673ff75cb05aa12f1d

          SHA512

          2799db51bb9842333288d7c7b44a126b17e0adeb3fd67e83464ab42001fb23f4566a3337d2155d5dafad5de29f41d9cb2d111e914c29cc991ddda288f971c4bc

        • memory/2852-28-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2852-20-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/2852-22-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/2852-24-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/2852-26-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/2852-30-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/2852-33-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/2852-34-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/2852-35-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/3056-17-0x00000000003D0000-0x00000000003D1000-memory.dmp

          Filesize

          4KB

        • memory/3056-16-0x0000000002000000-0x0000000002001000-memory.dmp

          Filesize

          4KB

        • memory/3056-37-0x0000000000400000-0x0000000000405000-memory.dmp

          Filesize

          20KB