Analysis
-
max time kernel
147s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 11:06
Behavioral task
behavioral1
Sample
7488bf60cf7668088980c90e56c7e141.exe
Resource
win7-20231215-en
General
-
Target
7488bf60cf7668088980c90e56c7e141.exe
-
Size
2.5MB
-
MD5
7488bf60cf7668088980c90e56c7e141
-
SHA1
a16d778a22f443febe1ce5fa4c6357892d31e435
-
SHA256
3d506268666198f5ff10a3d1b47716b7c4236327eab711e12a2da2c6a3bfd9f6
-
SHA512
e6a8ced28e88890a2d0f3d2adace47f1f683aec588de4446ca34d381ac6556a1adac743ff45e8eaa42972b2135d4b633f84a84099e5072418188e1adaa02d9c9
-
SSDEEP
49152:c8jblXS2hj9wP6p+MYTTu/dRV2i3s0nTXO88:HjZv+MYTKlR1807OV
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1592 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2380 servero.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Wine 7488bf60cf7668088980c90e56c7e141.exe -
resource yara_rule behavioral1/memory/1068-0-0x0000000000400000-0x000000000068E000-memory.dmp upx behavioral1/files/0x000a0000000135c2-21.dat upx behavioral1/memory/1068-3-0x0000000000400000-0x000000000068E000-memory.dmp upx behavioral1/memory/2380-22-0x0000000000400000-0x000000000068E000-memory.dmp upx behavioral1/files/0x000a0000000135c2-23.dat upx behavioral1/memory/1068-33-0x0000000000400000-0x000000000068E000-memory.dmp upx behavioral1/memory/2380-34-0x0000000000400000-0x000000000068E000-memory.dmp upx behavioral1/memory/2380-56-0x0000000000400000-0x000000000068E000-memory.dmp upx behavioral1/memory/2380-60-0x0000000000400000-0x000000000068E000-memory.dmp upx behavioral1/memory/2380-61-0x0000000000400000-0x000000000068E000-memory.dmp upx behavioral1/memory/2380-62-0x0000000000400000-0x000000000068E000-memory.dmp upx behavioral1/memory/2380-63-0x0000000000400000-0x000000000068E000-memory.dmp upx behavioral1/memory/2380-64-0x0000000000400000-0x000000000068E000-memory.dmp upx behavioral1/memory/2380-65-0x0000000000400000-0x000000000068E000-memory.dmp upx behavioral1/memory/2380-66-0x0000000000400000-0x000000000068E000-memory.dmp upx behavioral1/memory/2380-67-0x0000000000400000-0x000000000068E000-memory.dmp upx behavioral1/memory/2380-68-0x0000000000400000-0x000000000068E000-memory.dmp upx behavioral1/memory/2380-69-0x0000000000400000-0x000000000068E000-memory.dmp upx behavioral1/memory/2380-70-0x0000000000400000-0x000000000068E000-memory.dmp upx behavioral1/memory/2380-71-0x0000000000400000-0x000000000068E000-memory.dmp upx behavioral1/memory/2380-72-0x0000000000400000-0x000000000068E000-memory.dmp upx behavioral1/memory/2380-73-0x0000000000400000-0x000000000068E000-memory.dmp upx behavioral1/memory/2380-74-0x0000000000400000-0x000000000068E000-memory.dmp upx -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 7488bf60cf7668088980c90e56c7e141.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA servero.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat servero.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1068 7488bf60cf7668088980c90e56c7e141.exe 2380 servero.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\servero.cfg servero.exe File created C:\Windows\servero.exe 7488bf60cf7668088980c90e56c7e141.exe File opened for modification C:\Windows\servero.exe 7488bf60cf7668088980c90e56c7e141.exe File opened for modification C:\Windows\servero.cfg servero.exe -
Modifies Control Panel 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Control Panel\International\sDate = "-" 7488bf60cf7668088980c90e56c7e141.exe Key created \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Control Panel\International 7488bf60cf7668088980c90e56c7e141.exe -
Modifies data under HKEY_USERS 11 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings servero.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 servero.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\EnableAutodisconnect = 00000000 7488bf60cf7668088980c90e56c7e141.exe Key created \REGISTRY\USER\.DEFAULT\Control Panel\International servero.exe Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\International\sDate = "-" servero.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections servero.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings servero.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" servero.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 servero.exe Key created \REGISTRY\USER\.Default\Software\Microsoft\Windows\CurrentVersion\Internet Settings 7488bf60cf7668088980c90e56c7e141.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\EnableAutodial = 00000000 7488bf60cf7668088980c90e56c7e141.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1068 7488bf60cf7668088980c90e56c7e141.exe 2380 servero.exe 2380 servero.exe 2380 servero.exe 2380 servero.exe 2380 servero.exe 2380 servero.exe 2380 servero.exe 2380 servero.exe 2380 servero.exe 2380 servero.exe 2380 servero.exe 2380 servero.exe 2380 servero.exe 2380 servero.exe 2380 servero.exe 2380 servero.exe 2380 servero.exe 2380 servero.exe 2380 servero.exe 2380 servero.exe 2380 servero.exe 2380 servero.exe 2380 servero.exe 2380 servero.exe 2380 servero.exe 2380 servero.exe 2380 servero.exe 2380 servero.exe 2380 servero.exe 2380 servero.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1068 wrote to memory of 1592 1068 7488bf60cf7668088980c90e56c7e141.exe 29 PID 1068 wrote to memory of 1592 1068 7488bf60cf7668088980c90e56c7e141.exe 29 PID 1068 wrote to memory of 1592 1068 7488bf60cf7668088980c90e56c7e141.exe 29 PID 1068 wrote to memory of 1592 1068 7488bf60cf7668088980c90e56c7e141.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7488bf60cf7668088980c90e56c7e141.exe"C:\Users\Admin\AppData\Local\Temp\7488bf60cf7668088980c90e56c7e141.exe"1⤵
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Modifies Control Panel
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\$$a$$.bat2⤵
- Deletes itself
PID:1592
-
-
C:\Windows\servero.exeC:\Windows\servero.exe1⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD587a94e114c2ab7fe9905351575383d8a
SHA154455baecfdec3f376982df7c00bfcb2c3b5c32f
SHA256899835250215da28f362b4cc81fc4ff0c94f8dccd9bb7bb4ee2a37d909009802
SHA51282c0c2a4b4ec41ef80d62c93c54c1f41f86498b639244cdad1dbfc64a157a8e02040096e7083e15035410b3962854719bee7dc18a1932ee8bfd86ea9b898b623
-
Filesize
2.2MB
MD59028767b8e7afd5cd83667721b7a1842
SHA1bcb5fa37961aacb9e573172415e5a280488cae6e
SHA256335034da7731d6c410c5c4763a8d00f79279722b68741bbbe6f6f1d0353d522c
SHA5124a5a32129edf372c338911b289aa2b624621f6273a5d104eb9fc6b6801c168553bf01304bad8e64f8089dd543e68b8431d35346804e6e0446d96ca4064612f0f
-
Filesize
1.7MB
MD51f02577f45aa02d4bd22e8722d61c75e
SHA1fd8920fc67d35b011345695c7a1d1291b5cdbca6
SHA2561436cdbe95112e0edab2f5acb145dc4c4f0ea616e99e140d9dc79139d95458d9
SHA512440f069c945683744b3828740a9fbdee66947a9181167e99c119cbb37de3c7064058f3ae0d27fa50e0afe6d4133f29e08cd80c80c94196ca8f8c4c83b9a60e46