Analysis
-
max time kernel
117s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-03-2024 18:00
Behavioral task
behavioral1
Sample
b805cfc2646c7d1060652a9a4eecaf3b.exe
Resource
win7-20240221-en
General
-
Target
b805cfc2646c7d1060652a9a4eecaf3b.exe
-
Size
1.5MB
-
MD5
b805cfc2646c7d1060652a9a4eecaf3b
-
SHA1
4469f441f6eeee340958ded387b728cdaf0f0250
-
SHA256
1d3b41a621b7e377118769557b041fbc7143566621891a493fc22656d893f796
-
SHA512
b418f2676f6fe17c5acd8a448bd1b520cd943898107023a120ac949f07e90fd5a64380b3c6c268dc2951c8569dd8567e004eeb6c454042fc27cbbe7991742b88
-
SSDEEP
24576:MnbHSUVEWTqp7UQbKcMmtiprF1kEYKc46tq8/97SxC2XrTyLUDudCTyOTp0:MnbHBVEWTqp7/xMmoFXYKktq+97SxNnC
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2052 gncbdg.exe 2072 gncbdg.exe 2828 hcbsmw.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Wine b805cfc2646c7d1060652a9a4eecaf3b.exe -
Loads dropped DLL 5 IoCs
pid Process 2524 b805cfc2646c7d1060652a9a4eecaf3b.exe 2524 b805cfc2646c7d1060652a9a4eecaf3b.exe 2052 gncbdg.exe 2524 b805cfc2646c7d1060652a9a4eecaf3b.exe 2524 b805cfc2646c7d1060652a9a4eecaf3b.exe -
resource yara_rule behavioral1/memory/2748-0-0x0000000010000000-0x00000000102EB000-memory.dmp themida behavioral1/memory/2748-3-0x0000000010000000-0x00000000102EB000-memory.dmp themida behavioral1/memory/2748-15-0x0000000010000000-0x00000000102EB000-memory.dmp themida -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b805cfc2646c7d1060652a9a4eecaf3b.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2748 set thread context of 2524 2748 b805cfc2646c7d1060652a9a4eecaf3b.exe 28 PID 2052 set thread context of 2072 2052 gncbdg.exe 30 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2748 b805cfc2646c7d1060652a9a4eecaf3b.exe 2072 gncbdg.exe 2072 gncbdg.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2524 2748 b805cfc2646c7d1060652a9a4eecaf3b.exe 28 PID 2748 wrote to memory of 2524 2748 b805cfc2646c7d1060652a9a4eecaf3b.exe 28 PID 2748 wrote to memory of 2524 2748 b805cfc2646c7d1060652a9a4eecaf3b.exe 28 PID 2748 wrote to memory of 2524 2748 b805cfc2646c7d1060652a9a4eecaf3b.exe 28 PID 2748 wrote to memory of 2524 2748 b805cfc2646c7d1060652a9a4eecaf3b.exe 28 PID 2748 wrote to memory of 2524 2748 b805cfc2646c7d1060652a9a4eecaf3b.exe 28 PID 2524 wrote to memory of 2052 2524 b805cfc2646c7d1060652a9a4eecaf3b.exe 29 PID 2524 wrote to memory of 2052 2524 b805cfc2646c7d1060652a9a4eecaf3b.exe 29 PID 2524 wrote to memory of 2052 2524 b805cfc2646c7d1060652a9a4eecaf3b.exe 29 PID 2524 wrote to memory of 2052 2524 b805cfc2646c7d1060652a9a4eecaf3b.exe 29 PID 2052 wrote to memory of 2072 2052 gncbdg.exe 30 PID 2052 wrote to memory of 2072 2052 gncbdg.exe 30 PID 2052 wrote to memory of 2072 2052 gncbdg.exe 30 PID 2052 wrote to memory of 2072 2052 gncbdg.exe 30 PID 2052 wrote to memory of 2072 2052 gncbdg.exe 30 PID 2052 wrote to memory of 2072 2052 gncbdg.exe 30 PID 2072 wrote to memory of 1408 2072 gncbdg.exe 21 PID 2524 wrote to memory of 2828 2524 b805cfc2646c7d1060652a9a4eecaf3b.exe 31 PID 2524 wrote to memory of 2828 2524 b805cfc2646c7d1060652a9a4eecaf3b.exe 31 PID 2524 wrote to memory of 2828 2524 b805cfc2646c7d1060652a9a4eecaf3b.exe 31 PID 2524 wrote to memory of 2828 2524 b805cfc2646c7d1060652a9a4eecaf3b.exe 31 PID 2828 wrote to memory of 2304 2828 hcbsmw.exe 32 PID 2828 wrote to memory of 2304 2828 hcbsmw.exe 32 PID 2828 wrote to memory of 2304 2828 hcbsmw.exe 32 PID 2828 wrote to memory of 2304 2828 hcbsmw.exe 32 PID 2072 wrote to memory of 1408 2072 gncbdg.exe 21 PID 2072 wrote to memory of 1408 2072 gncbdg.exe 21 PID 2072 wrote to memory of 1408 2072 gncbdg.exe 21 PID 2072 wrote to memory of 1408 2072 gncbdg.exe 21 PID 2072 wrote to memory of 1408 2072 gncbdg.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\b805cfc2646c7d1060652a9a4eecaf3b.exe"C:\Users\Admin\AppData\Local\Temp\b805cfc2646c7d1060652a9a4eecaf3b.exe"2⤵
- Identifies Wine through registry keys
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\b805cfc2646c7d1060652a9a4eecaf3b.exeC:\Users\Admin\AppData\Local\Temp\b805cfc2646c7d1060652a9a4eecaf3b.exe3⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gncbdg.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gncbdg.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gncbdg.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gncbdg.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2072
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hcbsmw.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\hcbsmw.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2304
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD52a8b8f438aa34414cb85f8a1631f5188
SHA1275210680630c0e2c0dcdc2ba1a83a5af3cb0fbd
SHA25680e6e1c874832caff48017c5513a8f7e3a65b1dfac76fe22cca6c2e91dbb9b76
SHA512d51a1ca86bbb583acda1c49954363221c0ff1ec54d26b1c6b63fd74372153e4a8ff0249e206b0f477602d26b6fed86e2fd635d29e441d0c913faba822df358ae
-
Filesize
133KB
MD5c68cb7cfc28a8da48b445ba450f230ec
SHA1b6a02cb4b57e994b8fc7e7712e089a8886e609a2
SHA2563e043850157d2dc33eb178ee60222ea093bb3fb042c823f649ee2fc56c0923c9
SHA512d8477d441c4bf88671169c1bd44e268817819c8c90caefd0ecd21e4d384ed5d0880fc9abb3b708e4e5e5596c2b920ee11355973920ff6e3ba783311c5e88f95f