Analysis

  • max time kernel
    148s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/07/2024, 20:34

General

  • Target

    system/Fire.dll

  • Size

    308KB

  • MD5

    385a0193e336a2f2f8d549bd3c5310a4

  • SHA1

    76bcee3e3cde7a8a02549cd32d30ba5ff0050f40

  • SHA256

    fbdab449469d1b469b87db48c6e321c419d24263a401bfd9d0b02172cdfe6c5b

  • SHA512

    35aa2dbed80020c22810299d1ce5205400c422d13505f63e2d4a4922fb766697f5b1eddf212049cf0241edff8a7ab2f4c5c5d7754ddb79e081fda1ad62f898fa

  • SSDEEP

    3072:+AshkEC+niW81TLmvz5u/p3T9R4VLioH7D5kVOqBGPYz:0yKvz5uh3TwDSVOJPYz

Score
7/10

Malware Config

Signatures

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\system\Fire.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1168
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\system\Fire.dll,#1
      2⤵
      • Identifies Wine through registry keys
      PID:4556

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4556-0-0x0000000001050000-0x000000000105F000-memory.dmp

    Filesize

    60KB

  • memory/4556-2-0x0000000002840000-0x000000000287F000-memory.dmp

    Filesize

    252KB

  • memory/4556-3-0x0000000002840000-0x0000000004543000-memory.dmp

    Filesize

    29.0MB

  • memory/4556-4-0x0000000002880000-0x0000000004583000-memory.dmp

    Filesize

    29.0MB

  • memory/4556-8-0x00000000045E0000-0x00000000045E1000-memory.dmp

    Filesize

    4KB

  • memory/4556-7-0x0000000004A20000-0x0000000004BBE000-memory.dmp

    Filesize

    1.6MB

  • memory/4556-6-0x0000000004680000-0x000000000471D000-memory.dmp

    Filesize

    628KB

  • memory/4556-5-0x0000000004830000-0x0000000004928000-memory.dmp

    Filesize

    992KB

  • memory/4556-9-0x0000000002840000-0x0000000004543000-memory.dmp

    Filesize

    29.0MB

  • memory/4556-10-0x0000000002880000-0x0000000004583000-memory.dmp

    Filesize

    29.0MB