Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/03/2024, 23:24
Behavioral task
behavioral1
Sample
bd143b10dcdb8a615146d4d21fd49d0c.exe
Resource
win7-20240221-en
8 signatures
150 seconds
General
-
Target
bd143b10dcdb8a615146d4d21fd49d0c.exe
-
Size
599KB
-
MD5
bd143b10dcdb8a615146d4d21fd49d0c
-
SHA1
6c68b47f039e6184dfa21160dc58c6c25d102526
-
SHA256
e30c972e20df918746c1f082e594a3b70b03b438579f649a1d8291d51992fcd4
-
SHA512
fa95ef88f8ee8d6c83521672fc71f0e950259da718157c416c637dd968438d79698ecd1c97da9c8b1526dd8ca8129862856ce3a060ff5007b2e63cf8fc4eaa63
-
SSDEEP
12288:TB5UB5H29gx/rvrTTHnQ2ggA8XOD8dwFssCifeu+HG+v:TBOHL/TTHnEg7XOD8ksspeus
Malware Config
Signatures
-
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Wine bd143b10dcdb8a615146d4d21fd49d0c.exe Key opened \REGISTRY\USER\S-1-5-21-406356229-2805545415-1236085040-1000\Software\Wine bd143b10dcdb8a615146d4d21fd49d0c.exe -
resource yara_rule behavioral1/memory/2208-0-0x0000000015110000-0x0000000015267000-memory.dmp themida behavioral1/memory/2208-2-0x0000000015110000-0x0000000015267000-memory.dmp themida behavioral1/memory/2600-11-0x0000000015110000-0x0000000015267000-memory.dmp themida behavioral1/memory/2600-12-0x0000000015110000-0x0000000015267000-memory.dmp themida -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\mssrv32.exe bd143b10dcdb8a615146d4d21fd49d0c.exe File opened for modification \??\c:\windows\SysWOW64\mssrv32.exe bd143b10dcdb8a615146d4d21fd49d0c.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2208 bd143b10dcdb8a615146d4d21fd49d0c.exe 2600 bd143b10dcdb8a615146d4d21fd49d0c.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2600 set thread context of 2548 2600 bd143b10dcdb8a615146d4d21fd49d0c.exe 29 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2208 bd143b10dcdb8a615146d4d21fd49d0c.exe 2600 bd143b10dcdb8a615146d4d21fd49d0c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2208 bd143b10dcdb8a615146d4d21fd49d0c.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2600 2208 bd143b10dcdb8a615146d4d21fd49d0c.exe 28 PID 2208 wrote to memory of 2600 2208 bd143b10dcdb8a615146d4d21fd49d0c.exe 28 PID 2208 wrote to memory of 2600 2208 bd143b10dcdb8a615146d4d21fd49d0c.exe 28 PID 2208 wrote to memory of 2600 2208 bd143b10dcdb8a615146d4d21fd49d0c.exe 28 PID 2600 wrote to memory of 2548 2600 bd143b10dcdb8a615146d4d21fd49d0c.exe 29 PID 2600 wrote to memory of 2548 2600 bd143b10dcdb8a615146d4d21fd49d0c.exe 29 PID 2600 wrote to memory of 2548 2600 bd143b10dcdb8a615146d4d21fd49d0c.exe 29 PID 2600 wrote to memory of 2548 2600 bd143b10dcdb8a615146d4d21fd49d0c.exe 29 PID 2600 wrote to memory of 2548 2600 bd143b10dcdb8a615146d4d21fd49d0c.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd143b10dcdb8a615146d4d21fd49d0c.exe"C:\Users\Admin\AppData\Local\Temp\bd143b10dcdb8a615146d4d21fd49d0c.exe"1⤵
- Identifies Wine through registry keys
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2208 -
\??\c:\users\admin\appdata\local\temp\bd143b10dcdb8a615146d4d21fd49d0c.exec:\users\admin\appdata\local\temp\bd143b10dcdb8a615146d4d21fd49d0c.exe2⤵
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2548
-
-