Analysis
-
max time kernel
147s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01/02/2024, 01:54
Behavioral task
behavioral1
Sample
859f4e25c421355b01e43bcf1909a2ab.exe
Resource
win7-20231129-en
General
-
Target
859f4e25c421355b01e43bcf1909a2ab.exe
-
Size
485KB
-
MD5
859f4e25c421355b01e43bcf1909a2ab
-
SHA1
682964af85fd3887758ca224f4f5c241d39d8790
-
SHA256
24d9aaeeffae4dbcdc765cb493ab61e3b178996413bd1d0c238d7b810f142efa
-
SHA512
f0d40b3ccc6c655c32a11cd3cc925c2c27889ca6bb04e627794ecd4e409ddd733133f98b9206e1e421e6a533e7d8d61e4cdbdaeb36773d699b973cbf607fcafe
-
SSDEEP
12288:DGADoa45fuKHmOtAwtDZgu49xCEIIKGB28IfkqBxveXUc:y3uKhtDFZguxfkq5c
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2608 winscrne.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Wine 859f4e25c421355b01e43bcf1909a2ab.exe Key opened \REGISTRY\USER\S-1-5-21-3470981204-343661084-3367201002-1000\Software\Wine winscrne.exe -
Loads dropped DLL 2 IoCs
pid Process 2888 859f4e25c421355b01e43bcf1909a2ab.exe 2888 859f4e25c421355b01e43bcf1909a2ab.exe -
resource yara_rule behavioral1/memory/2888-0-0x0000000000400000-0x000000000054C000-memory.dmp themida behavioral1/memory/2888-1-0x0000000000400000-0x000000000054C000-memory.dmp themida behavioral1/files/0x000a000000013a1a-12.dat themida behavioral1/memory/2888-14-0x0000000004690000-0x00000000047DC000-memory.dmp themida behavioral1/memory/2888-21-0x0000000000400000-0x000000000054C000-memory.dmp themida behavioral1/memory/2608-23-0x0000000000400000-0x000000000054C000-memory.dmp themida behavioral1/memory/2608-24-0x0000000000400000-0x000000000054C000-memory.dmp themida behavioral1/memory/2608-36-0x0000000000400000-0x000000000054C000-memory.dmp themida behavioral1/memory/2608-37-0x0000000000400000-0x000000000054C000-memory.dmp themida behavioral1/memory/2608-38-0x0000000000400000-0x000000000054C000-memory.dmp themida behavioral1/memory/2608-39-0x0000000000400000-0x000000000054C000-memory.dmp themida behavioral1/memory/2608-40-0x0000000000400000-0x000000000054C000-memory.dmp themida behavioral1/memory/2608-41-0x0000000000400000-0x000000000054C000-memory.dmp themida behavioral1/memory/2608-42-0x0000000000400000-0x000000000054C000-memory.dmp themida behavioral1/memory/2608-43-0x0000000000400000-0x000000000054C000-memory.dmp themida behavioral1/memory/2608-44-0x0000000000400000-0x000000000054C000-memory.dmp themida behavioral1/memory/2608-45-0x0000000000400000-0x000000000054C000-memory.dmp themida behavioral1/memory/2608-46-0x0000000000400000-0x000000000054C000-memory.dmp themida behavioral1/memory/2608-47-0x0000000000400000-0x000000000054C000-memory.dmp themida behavioral1/memory/2608-48-0x0000000000400000-0x000000000054C000-memory.dmp themida behavioral1/memory/2608-49-0x0000000000400000-0x000000000054C000-memory.dmp themida behavioral1/memory/2608-50-0x0000000000400000-0x000000000054C000-memory.dmp themida behavioral1/memory/2608-51-0x0000000000400000-0x000000000054C000-memory.dmp themida -
Drops file in System32 directory 20 IoCs
description ioc Process File created C:\Windows\SysWOW64\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe winscrne.exe File created C:\Windows\SysWOW64\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe winscrne.exe File created C:\Windows\SysWOW64\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe winscrne.exe File opened for modification C:\Windows\SysWOW64\winscrne.exe 859f4e25c421355b01e43bcf1909a2ab.exe File created C:\Windows\SysWOW64\winscrne.exe\winscrne.exe winscrne.exe File created C:\Windows\SysWOW64\winscrne.exe\winscrne.exe\winscrne.exe winscrne.exe File created C:\Windows\SysWOW64\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe winscrne.exe File created C:\Windows\SysWOW64\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe winscrne.exe File created C:\Windows\SysWOW64\winscrne.exe 859f4e25c421355b01e43bcf1909a2ab.exe File created C:\Windows\SysWOW64\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe winscrne.exe File created C:\Windows\SysWOW64\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe winscrne.exe File created C:\Windows\SysWOW64\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe winscrne.exe File created C:\Windows\SysWOW64\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe winscrne.exe File created C:\Windows\SysWOW64\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe winscrne.exe File created C:\Windows\SysWOW64\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe winscrne.exe File created C:\Windows\SysWOW64\winscrne.exe winscrne.exe File created C:\Windows\SysWOW64\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe winscrne.exe File created C:\Windows\SysWOW64\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe winscrne.exe File created C:\Windows\SysWOW64\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe winscrne.exe File created C:\Windows\SysWOW64\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe\winscrne.exe winscrne.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2888 859f4e25c421355b01e43bcf1909a2ab.exe 2608 winscrne.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2608 2888 859f4e25c421355b01e43bcf1909a2ab.exe 28 PID 2888 wrote to memory of 2608 2888 859f4e25c421355b01e43bcf1909a2ab.exe 28 PID 2888 wrote to memory of 2608 2888 859f4e25c421355b01e43bcf1909a2ab.exe 28 PID 2888 wrote to memory of 2608 2888 859f4e25c421355b01e43bcf1909a2ab.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\859f4e25c421355b01e43bcf1909a2ab.exe"C:\Users\Admin\AppData\Local\Temp\859f4e25c421355b01e43bcf1909a2ab.exe"1⤵
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\winscrne.exeC:\Windows\system32\winscrne.exe2⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2608
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
485KB
MD5859f4e25c421355b01e43bcf1909a2ab
SHA1682964af85fd3887758ca224f4f5c241d39d8790
SHA25624d9aaeeffae4dbcdc765cb493ab61e3b178996413bd1d0c238d7b810f142efa
SHA512f0d40b3ccc6c655c32a11cd3cc925c2c27889ca6bb04e627794ecd4e409ddd733133f98b9206e1e421e6a533e7d8d61e4cdbdaeb36773d699b973cbf607fcafe