Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19/08/2024, 15:53
Static task
static1
Behavioral task
behavioral1
Sample
Workshop www.unlockmexico.net/cdma workshop.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Workshop www.unlockmexico.net/cdma workshop.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Workshop www.unlockmexico.net/cdma_workshop_FULL_Cracked.exe
Resource
win7-20240708-en
General
-
Target
Workshop www.unlockmexico.net/cdma workshop.exe
-
Size
980KB
-
MD5
6e4aa3d87cb3b35dbdef34b5f268a374
-
SHA1
441ed576b03558130ecacd7c03408c6033b54894
-
SHA256
74b91fb5bb5c61ed31d7e0ddf5ea7cd1c5ddea3648860dd99633e73850e83f37
-
SHA512
0c0d316c70610ac0b70aa9f96606cff1ed6576242387a2de0c4290c0e49027f34a0fa77cc34e22ce47676db6da632d006c39a17954ee92fa97486942d4867bf7
-
SSDEEP
12288:AX2IRXk+aiptW5v9edN1gFAbdYgxBLraaW:AX2Ie+qI+oBraaW
Malware Config
Signatures
-
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000\Software\Wine cdma_workshop_FULL_Cracked.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2316 cdma_workshop_FULL_Cracked.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cdma workshop.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cdma_workshop_FULL_Cracked.exe -
Modifies registry class 11 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A4293E2D-C623-796F-944E-03505E82}\ProdID = 3da864b33caa7e7ee226c1cedf8ad67d cdma_workshop_FULL_Cracked.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7AAF682C-6792-3A7E-089B-7FD3D3D2} cdma_workshop_FULL_Cracked.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{7AAF682C-6792-3A7E-089B-7FD3D3D2}\ProdID = 4d75a1133eb4807f02c9fdf0e967d252 cdma_workshop_FULL_Cracked.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D1578128-9409-0B1E-BA6A-8C9915D0} cdma_workshop_FULL_Cracked.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{618747EB-D474-709B-D55D-F588BE4E}\ProdID = 84d302fbea037b1dc232c3c11c623a9e cdma_workshop_FULL_Cracked.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{618747EB-D474-709B-D55D-F588BE4E}\ProdID = 84d302fbea037b1dc232c3c11c623a9e5587b267 cdma_workshop_FULL_Cracked.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{A4293E2D-C623-796F-944E-03505E82} cdma_workshop_FULL_Cracked.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3F4E01F0-014D-08E8-1709-04A1F950} cdma_workshop_FULL_Cracked.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3F4E01F0-014D-08E8-1709-04A1F950}\ProdID = 7b58fdfa28ba028022320abd696c0bbc cdma_workshop_FULL_Cracked.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{D1578128-9409-0B1E-BA6A-8C9915D0}\ProdID = 72670b0d22d482ee3ac5cac1ea253a9e cdma_workshop_FULL_Cracked.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{618747EB-D474-709B-D55D-F588BE4E} cdma_workshop_FULL_Cracked.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2316 cdma_workshop_FULL_Cracked.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2316 2820 cdma workshop.exe 30 PID 2820 wrote to memory of 2316 2820 cdma workshop.exe 30 PID 2820 wrote to memory of 2316 2820 cdma workshop.exe 30 PID 2820 wrote to memory of 2316 2820 cdma workshop.exe 30 PID 2820 wrote to memory of 2316 2820 cdma workshop.exe 30 PID 2820 wrote to memory of 2316 2820 cdma workshop.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Workshop www.unlockmexico.net\cdma workshop.exe"C:\Users\Admin\AppData\Local\Temp\Workshop www.unlockmexico.net\cdma workshop.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\Workshop www.unlockmexico.net\cdma_workshop_FULL_Cracked.exe"cdma_workshop_FULL_Cracked.exe"2⤵
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2316
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
440B
MD50de37f6b2c1e34ed985fa40edc5b9911
SHA161be7840de9931a288ca9abdea1c942b84ce66b6
SHA2564c1dfddfaceda12bb8e92ade509330efbf10a8372d0a4ba901267cb467fe190d
SHA5128d88679b5d65cede149284f9d764f5d42e646eacaf0957bae0d43c765f09a52ad8ccc1b2eda625eaecc53c4df981e6ef0049680836b3e6546721f52e5ee0d90e