Analysis

  • max time kernel
    41s
  • max time network
    49s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/07/2024, 20:34

General

  • Target

    system/WinDrv.dll

  • Size

    616KB

  • MD5

    a01ca9cbe89ce9ab665ba4d64cf15865

  • SHA1

    9f65a3dbbb563f10271bcc5e313fb84309feaee3

  • SHA256

    41e8872c53c7f36cf6abba398b0439845f923853059be145f5cfee8d781c7f58

  • SHA512

    b655eadd1a0c726b737cb42ca96211dc7322ae653b2bbb32da60e8c0c580ab01f0a2573844ed9c2e8a0ac545433f32507a085255f7f28796b2a3a58221ac122f

  • SSDEEP

    6144:63Hn0D/H/ZCmILfeeqnjahQYRxUkUcIE6hqw:63n0D+e7FMw

Score
7/10

Malware Config

Signatures

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Themida packer 2 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\system\WinDrv.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3448
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\system\WinDrv.dll,#1
      2⤵
      • Identifies Wine through registry keys
      PID:4080

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4080-0-0x00000000022E0000-0x00000000022EF000-memory.dmp

    Filesize

    60KB

  • memory/4080-1-0x0000000002300000-0x000000000233F000-memory.dmp

    Filesize

    252KB

  • memory/4080-3-0x00000000022E0000-0x0000000003FE3000-memory.dmp

    Filesize

    29.0MB

  • memory/4080-7-0x0000000004150000-0x00000000041ED000-memory.dmp

    Filesize

    628KB

  • memory/4080-4-0x0000000003FF0000-0x0000000005CF3000-memory.dmp

    Filesize

    29.0MB

  • memory/4080-8-0x0000000004430000-0x00000000045CE000-memory.dmp

    Filesize

    1.6MB

  • memory/4080-5-0x00000000040D0000-0x00000000040D1000-memory.dmp

    Filesize

    4KB

  • memory/4080-6-0x0000000004230000-0x0000000004328000-memory.dmp

    Filesize

    992KB

  • memory/4080-9-0x0000000002340000-0x0000000004043000-memory.dmp

    Filesize

    29.0MB

  • memory/4080-10-0x00000000022E0000-0x0000000003FE3000-memory.dmp

    Filesize

    29.0MB

  • memory/4080-11-0x0000000003FF0000-0x0000000005CF3000-memory.dmp

    Filesize

    29.0MB

  • memory/4080-12-0x0000000002340000-0x0000000004043000-memory.dmp

    Filesize

    29.0MB