Analysis
-
max time kernel
142s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28/02/2024, 09:54
Behavioral task
behavioral1
Sample
ab9b70ac3e4e75ad4e5f7fe4d1e22e08.exe
Resource
win7-20240221-en
5 signatures
150 seconds
General
-
Target
ab9b70ac3e4e75ad4e5f7fe4d1e22e08.exe
-
Size
4.2MB
-
MD5
ab9b70ac3e4e75ad4e5f7fe4d1e22e08
-
SHA1
f5834275ba276bdd0b1069d6cea9ac805a79e1e1
-
SHA256
179e5def6f5a2f730da007ec993800c6a7fd29f16c66f98275701006e49946f7
-
SHA512
cc97264d01d0b6f4acee5745f40f0c0795d8b28b36cca853236cd63ebb5f957aa16b9faad88b856095580fdeb9608ba449aff77aaf2f646461693090b1d71c0e
-
SSDEEP
98304:teU7/LbaWFdAEGrk9fSlchJOSKrmWrIUnjp7Cjr70xeH:t/baWHHGrk9fSlcbOSKrmdUnjp80xe
Score
7/10
Malware Config
Signatures
-
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1658372521-4246568289-2509113762-1000\Software\Wine ab9b70ac3e4e75ad4e5f7fe4d1e22e08.exe -
resource yara_rule behavioral1/memory/2492-0-0x0000000000400000-0x0000000001A2F000-memory.dmp themida behavioral1/memory/2492-3-0x0000000000400000-0x0000000001A2F000-memory.dmp themida behavioral1/memory/2492-32-0x0000000000400000-0x0000000001A2F000-memory.dmp themida behavioral1/memory/2492-33-0x0000000000400000-0x0000000001A2F000-memory.dmp themida behavioral1/memory/2492-35-0x0000000000400000-0x0000000001A2F000-memory.dmp themida behavioral1/memory/2492-40-0x0000000000400000-0x0000000001A2F000-memory.dmp themida behavioral1/memory/2492-41-0x0000000000400000-0x0000000001A2F000-memory.dmp themida behavioral1/memory/2492-42-0x0000000000400000-0x0000000001A2F000-memory.dmp themida behavioral1/memory/2492-43-0x0000000000400000-0x0000000001A2F000-memory.dmp themida behavioral1/memory/2492-44-0x0000000000400000-0x0000000001A2F000-memory.dmp themida behavioral1/memory/2492-45-0x0000000000400000-0x0000000001A2F000-memory.dmp themida behavioral1/memory/2492-46-0x0000000000400000-0x0000000001A2F000-memory.dmp themida behavioral1/memory/2492-47-0x0000000000400000-0x0000000001A2F000-memory.dmp themida behavioral1/memory/2492-48-0x0000000000400000-0x0000000001A2F000-memory.dmp themida behavioral1/memory/2492-49-0x0000000000400000-0x0000000001A2F000-memory.dmp themida behavioral1/memory/2492-50-0x0000000000400000-0x0000000001A2F000-memory.dmp themida behavioral1/memory/2492-51-0x0000000000400000-0x0000000001A2F000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Wapp = "C:\\Arquivos de programas\\Wapp.exe" ab9b70ac3e4e75ad4e5f7fe4d1e22e08.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2492 ab9b70ac3e4e75ad4e5f7fe4d1e22e08.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2492 ab9b70ac3e4e75ad4e5f7fe4d1e22e08.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ab9b70ac3e4e75ad4e5f7fe4d1e22e08.exe"C:\Users\Admin\AppData\Local\Temp\ab9b70ac3e4e75ad4e5f7fe4d1e22e08.exe"1⤵
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:2492