Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12/10/2024, 02:31
Behavioral task
behavioral1
Sample
7ddf2d75adf7bdaec6c21ab91aeebf7fafe396deb4c89dd1bc296a8c12256a5fN.exe
Resource
win7-20241010-en
General
-
Target
7ddf2d75adf7bdaec6c21ab91aeebf7fafe396deb4c89dd1bc296a8c12256a5fN.exe
-
Size
736KB
-
MD5
26a6e1f7ab836ad4237cb948bb3832b0
-
SHA1
d23af57537de2a7b4d4d9d5b25408c467a88fef6
-
SHA256
7ddf2d75adf7bdaec6c21ab91aeebf7fafe396deb4c89dd1bc296a8c12256a5f
-
SHA512
664d60e59ddad89e7020ffc6bd369f296f14abad0c8cc4f634e06121fb77e033b1096e2392199ebc7ab6b034986edb0e3c96dbe0113c624f842026e1f72db2de
-
SSDEEP
12288:yTWZtuNsyULBw7JLlpMSe0t/LPavPBhXwsNdCbPV0IwAG1LaKO:0sZtw7ll7t/QKqdCjVZG1+KO
Malware Config
Signatures
-
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine 7ddf2d75adf7bdaec6c21ab91aeebf7fafe396deb4c89dd1bc296a8c12256a5fN.exe -
resource yara_rule behavioral1/memory/1100-0-0x0000000000400000-0x00000000004B6000-memory.dmp themida behavioral1/memory/1100-3-0x0000000000400000-0x00000000004B6000-memory.dmp themida behavioral1/memory/1100-23-0x0000000000400000-0x00000000004B6000-memory.dmp themida -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ddf2d75adf7bdaec6c21ab91aeebf7fafe396deb4c89dd1bc296a8c12256a5fN.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1100 7ddf2d75adf7bdaec6c21ab91aeebf7fafe396deb4c89dd1bc296a8c12256a5fN.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1100 wrote to memory of 1192 1100 7ddf2d75adf7bdaec6c21ab91aeebf7fafe396deb4c89dd1bc296a8c12256a5fN.exe 21 PID 1100 wrote to memory of 1192 1100 7ddf2d75adf7bdaec6c21ab91aeebf7fafe396deb4c89dd1bc296a8c12256a5fN.exe 21 PID 1100 wrote to memory of 1192 1100 7ddf2d75adf7bdaec6c21ab91aeebf7fafe396deb4c89dd1bc296a8c12256a5fN.exe 21 PID 1100 wrote to memory of 1192 1100 7ddf2d75adf7bdaec6c21ab91aeebf7fafe396deb4c89dd1bc296a8c12256a5fN.exe 21 PID 1100 wrote to memory of 1192 1100 7ddf2d75adf7bdaec6c21ab91aeebf7fafe396deb4c89dd1bc296a8c12256a5fN.exe 21 PID 1100 wrote to memory of 1192 1100 7ddf2d75adf7bdaec6c21ab91aeebf7fafe396deb4c89dd1bc296a8c12256a5fN.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\7ddf2d75adf7bdaec6c21ab91aeebf7fafe396deb4c89dd1bc296a8c12256a5fN.exe"C:\Users\Admin\AppData\Local\Temp\7ddf2d75adf7bdaec6c21ab91aeebf7fafe396deb4c89dd1bc296a8c12256a5fN.exe"2⤵
- Identifies Wine through registry keys
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1100
-