Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
03-02-2024 13:05
Static task
static1
Behavioral task
behavioral1
Sample
8c657cdaeb25025153e52777590996e2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8c657cdaeb25025153e52777590996e2.exe
Resource
win10v2004-20231215-en
General
-
Target
8c657cdaeb25025153e52777590996e2.exe
-
Size
1.6MB
-
MD5
8c657cdaeb25025153e52777590996e2
-
SHA1
3d64bbc4f111d29752a1806ceebcdc26ede68e69
-
SHA256
a3a33ea371114c9cb4e483829520ac7e5b2686ded399c019c9b20df2dd65b505
-
SHA512
e9be59baa96e6999aab4f838f22650a1243dcd4052b6680b60c32dc2f51959e92eda9026fd151e62e6bd6444d6e03ac01a53ebde4106ae215a12fd1a2b42c6fe
-
SSDEEP
49152:/4nBO1JWkYDKsBeVpUpU6MUtygJyasJIwJaxSk2Z:QQ1zYXIVL6MU/Hw0xSk2Z
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2676 MINKE-IVY.EXE 2812 MINKE-IVY.EXE -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1603059206-2004189698-4139800220-1000\Software\Wine 8c657cdaeb25025153e52777590996e2.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2676 set thread context of 2812 2676 MINKE-IVY.EXE 29 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\MINKE-IVY.EXE 8c657cdaeb25025153e52777590996e2.exe File created C:\Windows\ROSAROJA.JPG 8c657cdaeb25025153e52777590996e2.exe File opened for modification C:\Windows\ROSAROJA.JPG DllHost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2308 2812 WerFault.exe 29 -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2696 DllHost.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1972 wrote to memory of 2676 1972 8c657cdaeb25025153e52777590996e2.exe 28 PID 1972 wrote to memory of 2676 1972 8c657cdaeb25025153e52777590996e2.exe 28 PID 1972 wrote to memory of 2676 1972 8c657cdaeb25025153e52777590996e2.exe 28 PID 1972 wrote to memory of 2676 1972 8c657cdaeb25025153e52777590996e2.exe 28 PID 2676 wrote to memory of 2812 2676 MINKE-IVY.EXE 29 PID 2676 wrote to memory of 2812 2676 MINKE-IVY.EXE 29 PID 2676 wrote to memory of 2812 2676 MINKE-IVY.EXE 29 PID 2676 wrote to memory of 2812 2676 MINKE-IVY.EXE 29 PID 2676 wrote to memory of 2812 2676 MINKE-IVY.EXE 29 PID 2676 wrote to memory of 2812 2676 MINKE-IVY.EXE 29 PID 2812 wrote to memory of 2308 2812 MINKE-IVY.EXE 30 PID 2812 wrote to memory of 2308 2812 MINKE-IVY.EXE 30 PID 2812 wrote to memory of 2308 2812 MINKE-IVY.EXE 30 PID 2812 wrote to memory of 2308 2812 MINKE-IVY.EXE 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c657cdaeb25025153e52777590996e2.exe"C:\Users\Admin\AppData\Local\Temp\8c657cdaeb25025153e52777590996e2.exe"1⤵
- Identifies Wine through registry keys
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\MINKE-IVY.EXE"C:\Windows\MINKE-IVY.EXE"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\MINKE-IVY.EXEC:\Windows\MINKE-IVY.EXE3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2812 -s 1164⤵
- Program crash
PID:2308
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
PID:2696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5e8b23e5f8395518302dfa03cabab2256
SHA1b48fc4db5a1c33c2658102cca891907aa7fa9d51
SHA2568dc7f26bedc293d8ddcbe52c4fec3e32e19e139f905e4e534337942e042f64ec
SHA5122ed91032e65c160e207a82dfeb23191908d2e87cd62494173b80526873890a3af5090f164e53f4dbc01f3cec080b1a5e82888ba5e7f2fc608bf8c8005f67a3de
-
Filesize
13KB
MD5d62ee5aa477fb2aa8f0e846980b0b9b2
SHA1b6f898fe7759b82e0f116b6dd0f148231904601b
SHA2566c2d5e2466b5aea0a3426c74a4a763ba1cd773cee02223e7c45003d6c588311d
SHA512f705418b4fd8845b5c45e6e130523e18f5a0afa5990c33d55a9813d9c5c8d8ff75356671942cf5f99c07d0c73390ff386ae52eeeb30c722a04fa46d321e193be