Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12-02-2024 12:18
Behavioral task
behavioral1
Sample
972282f0317f60e7e633db78ba110902.exe
Resource
win7-20231215-en
windows7-x64
5 signatures
150 seconds
General
-
Target
972282f0317f60e7e633db78ba110902.exe
-
Size
1.6MB
-
MD5
972282f0317f60e7e633db78ba110902
-
SHA1
34e3ecd3f940795bd90a17f61490cdaf86a2b1e4
-
SHA256
e1932ca9b4d6f226f95134d049c84d4cfd6b9f5a1be3aba0337ca65611e919d3
-
SHA512
de515b80f834aef003b51ba451af8265582e4717052beccff7edbad856bf7ca7f02323a180885628dc6d29c89987079a68d3b27b818d7292002c4ba13746575d
-
SSDEEP
49152:WZh/1Qgp3ddF8VAF6E0VYXai5/ermOR8qPuV:iL5F8VG6TVYqYe6OR8q+
Score
8/10
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\BITS\Parameters\ServiceDll = "C:\\Windows\\svchost.dll" 972282f0317f60e7e633db78ba110902.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Software\Wine 972282f0317f60e7e633db78ba110902.exe -
resource yara_rule behavioral1/memory/1896-0-0x0000000000400000-0x0000000000737000-memory.dmp themida behavioral1/memory/1896-3-0x0000000000400000-0x0000000000737000-memory.dmp themida behavioral1/memory/1896-22-0x0000000000400000-0x0000000000737000-memory.dmp themida -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svchost.dll 972282f0317f60e7e633db78ba110902.exe File opened for modification C:\Windows\svchost.dll 972282f0317f60e7e633db78ba110902.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1896 972282f0317f60e7e633db78ba110902.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\972282f0317f60e7e633db78ba110902.exe"C:\Users\Admin\AppData\Local\Temp\972282f0317f60e7e633db78ba110902.exe"1⤵
- Sets DLL path for service in the registry
- Identifies Wine through registry keys
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1896