Analysis
-
max time kernel
141s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-03-2024 10:24
Static task
static1
Behavioral task
behavioral1
Sample
b1e3fbbb8813acc2b9daeb1c78469f30.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b1e3fbbb8813acc2b9daeb1c78469f30.exe
Resource
win10v2004-20240226-en
General
-
Target
b1e3fbbb8813acc2b9daeb1c78469f30.exe
-
Size
837KB
-
MD5
b1e3fbbb8813acc2b9daeb1c78469f30
-
SHA1
258f626b93291317117c1959684e5930d3ad625f
-
SHA256
713144aa689863bfb8a36e05933bc3e49283d2ec7a95063f304edde93d35e379
-
SHA512
b7148e2c0c016510dce33b0284e76fa1b92de9bddfb409fbb35c6b86b3919a17a9436f03034ad6bc5fdc75f76a17c337ca2acd310809f06c9795e8eaac63fca3
-
SSDEEP
24576:x/Jq49kTXVType+AvDsvmW/8rgIysIYkr55HR8:XncXVType+AvDs/1IZkr5j8
Malware Config
Signatures
-
Processes:
b1e3fbbb8813acc2b9daeb1c78469f30.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b1e3fbbb8813acc2b9daeb1c78469f30.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
b1e3fbbb8813acc2b9daeb1c78469f30.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Wine b1e3fbbb8813acc2b9daeb1c78469f30.exe -
Processes:
b1e3fbbb8813acc2b9daeb1c78469f30.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b1e3fbbb8813acc2b9daeb1c78469f30.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
b1e3fbbb8813acc2b9daeb1c78469f30.exepid process 2368 b1e3fbbb8813acc2b9daeb1c78469f30.exe -
Drops file in Program Files directory 1 IoCs
Processes:
b1e3fbbb8813acc2b9daeb1c78469f30.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe b1e3fbbb8813acc2b9daeb1c78469f30.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
b1e3fbbb8813acc2b9daeb1c78469f30.exepid process 2368 b1e3fbbb8813acc2b9daeb1c78469f30.exe 2368 b1e3fbbb8813acc2b9daeb1c78469f30.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
b1e3fbbb8813acc2b9daeb1c78469f30.exedescription pid process Token: SeDebugPrivilege 2368 b1e3fbbb8813acc2b9daeb1c78469f30.exe Token: SeShutdownPrivilege 2368 b1e3fbbb8813acc2b9daeb1c78469f30.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
b1e3fbbb8813acc2b9daeb1c78469f30.exepid process 2368 b1e3fbbb8813acc2b9daeb1c78469f30.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
b1e3fbbb8813acc2b9daeb1c78469f30.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b1e3fbbb8813acc2b9daeb1c78469f30.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System b1e3fbbb8813acc2b9daeb1c78469f30.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1e3fbbb8813acc2b9daeb1c78469f30.exe"C:\Users\Admin\AppData\Local\Temp\b1e3fbbb8813acc2b9daeb1c78469f30.exe"1⤵
- UAC bypass
- Identifies Wine through registry keys
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:2368
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Virtualization/Sandbox Evasion
1