Analysis
-
max time kernel
142s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2024, 12:43
Static task
static1
Behavioral task
behavioral1
Sample
e1b1b16e6b5271a7b95ab7a99c11b992.exe
Resource
win7-20240215-en
General
-
Target
e1b1b16e6b5271a7b95ab7a99c11b992.exe
-
Size
2.3MB
-
MD5
e1b1b16e6b5271a7b95ab7a99c11b992
-
SHA1
0096ba72976dbf870ed5be602c6c60aad030c60f
-
SHA256
607b41bdc0fc51dd3676d5ffa11d1cd9f3ba67762d3f4233327068754aff8799
-
SHA512
e814be41f0a605c36f0c3c615cfe22191fb543a11a9f20b6a57599d5fe6849132fb403b4bbfd8a9b52ba76d3ac584636a5fbb9664fecda0b222ff2c801f12514
-
SSDEEP
49152:tWBQTR1zJeB9Y+ecr7/NAScKYhoomQ5ZXSE5PrnZKs9GIEFJGLnoy6nz4Wxmf44:KgHzwne07/NvcsHq5P7ZXGIzbovwP
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation e1b1b16e6b5271a7b95ab7a99c11b992.exe -
Executes dropped EXE 1 IoCs
pid Process 1508 rinst.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Wine rinst.exe -
resource yara_rule behavioral2/files/0x000600000002321b-16.dat themida behavioral2/memory/1508-21-0x0000000000400000-0x000000000052B000-memory.dmp themida behavioral2/memory/1508-24-0x0000000000400000-0x000000000052B000-memory.dmp themida -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1572 wrote to memory of 1508 1572 e1b1b16e6b5271a7b95ab7a99c11b992.exe 85 PID 1572 wrote to memory of 1508 1572 e1b1b16e6b5271a7b95ab7a99c11b992.exe 85 PID 1572 wrote to memory of 1508 1572 e1b1b16e6b5271a7b95ab7a99c11b992.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1b1b16e6b5271a7b95ab7a99c11b992.exe"C:\Users\Admin\AppData\Local\Temp\e1b1b16e6b5271a7b95ab7a99c11b992.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe"2⤵
- Executes dropped EXE
- Identifies Wine through registry keys
PID:1508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
511KB
MD5e436b13f39bd4a91416729d975f2d79e
SHA1896536accf0e14080b3cf63dea816ec8f6b50c10
SHA2568b0dd069a03d1039f106878c4f8eec508d84ba98811fdcb4425beb38a1452a77
SHA5121fb796e3d64824284f15338e45f3d6bd5a1253359a8411d7a493a96de80af2b788d823411868bfaa16a5052b47e061010843341225124858904f80a01d43f491