Analysis

  • max time kernel
    131s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/05/2024, 04:54

General

  • Target

    ehsvc.dll

  • Size

    2.2MB

  • MD5

    5cda9b81dee8a0007716fe544efdb917

  • SHA1

    539f5b64dd825ede4c755062bed4a9c6d7664c9d

  • SHA256

    78d47f032d493ce5fb59eecaa31aa2be047386ee0416780df19fb62db4d35272

  • SHA512

    f0c206f077b12daab882fbe2090d192e030cc6e4319f09dc4b62b2a56f4fbb89c6003b9d93d07ba0f10e17f48e3197872792ebac6670b9aa1c1e077d86ba30c0

  • SSDEEP

    49152:dMlCfUzvLjrM3RV/vife+OIBrercGAMOtKqd3wM12k3KzfblE3xE:perQV/7OeIGeEql12k3KG3u

Score
7/10

Malware Config

Signatures

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ehsvc.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3464
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ehsvc.dll,#1
      2⤵
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      PID:1436
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1436 -s 740
        3⤵
        • Program crash
        PID:4004
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1436 -ip 1436
    1⤵
      PID:2124

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1436-0-0x0000000010000000-0x0000000010495000-memory.dmp

      Filesize

      4.6MB

    • memory/1436-1-0x0000000010000000-0x0000000010495000-memory.dmp

      Filesize

      4.6MB

    • memory/1436-10-0x0000000010001000-0x0000000010067000-memory.dmp

      Filesize

      408KB

    • memory/1436-9-0x00000000028F0000-0x00000000028F1000-memory.dmp

      Filesize

      4KB

    • memory/1436-8-0x0000000000A10000-0x0000000000A11000-memory.dmp

      Filesize

      4KB

    • memory/1436-7-0x00000000028B0000-0x00000000028B1000-memory.dmp

      Filesize

      4KB

    • memory/1436-6-0x0000000002940000-0x0000000002942000-memory.dmp

      Filesize

      8KB

    • memory/1436-5-0x0000000002910000-0x0000000002911000-memory.dmp

      Filesize

      4KB

    • memory/1436-4-0x00000000028E0000-0x00000000028E1000-memory.dmp

      Filesize

      4KB

    • memory/1436-3-0x00000000028A0000-0x00000000028A1000-memory.dmp

      Filesize

      4KB

    • memory/1436-2-0x0000000002930000-0x0000000002931000-memory.dmp

      Filesize

      4KB

    • memory/1436-11-0x0000000010000000-0x0000000010495000-memory.dmp

      Filesize

      4.6MB

    • memory/1436-12-0x0000000010000000-0x0000000010495000-memory.dmp

      Filesize

      4.6MB

    • memory/1436-13-0x0000000000520000-0x0000000000534000-memory.dmp

      Filesize

      80KB