Analysis

  • max time kernel
    133s
  • max time network
    188s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    24-05-2022 02:14

General

  • Target

    2e12043576f00278e8e1207709477d00c5e750fe42ebbae261302df924fb92fa.exe

  • Size

    1.6MB

  • MD5

    f0120868b013fa572bad5ceb3d50798d

  • SHA1

    8ccd636f9852a713e9c0aff7f2cfba667ad95247

  • SHA256

    2e12043576f00278e8e1207709477d00c5e750fe42ebbae261302df924fb92fa

  • SHA512

    5c45d2834bfb3a57d98ff85142f4fe9675c8bbcebaf40859cd1e93b81c3a5e429531c71527b9d667ee8a2ad561a98b47980a098c69fbb564fe39b0ef6fda25d6

Malware Config

Extracted

Family

buer

C2

http://loaadik01.pro/

http://loaadik02.pro/

Signatures

  • Buer

    Buer is a new modular loader first seen in August 2019.

  • Buer Loader 2 IoCs

    Detects Buer loader in memory or disk.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Executes dropped EXE 1 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e12043576f00278e8e1207709477d00c5e750fe42ebbae261302df924fb92fa.exe
    "C:\Users\Admin\AppData\Local\Temp\2e12043576f00278e8e1207709477d00c5e750fe42ebbae261302df924fb92fa.exe"
    1⤵
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\Users\Admin\AppData\Roaming\UBlockPlugin\plugin.exe
      C:\Users\Admin\AppData\Roaming\UBlockPlugin\plugin.exe "C:\Users\Admin\AppData\Local\Temp\2e12043576f00278e8e1207709477d00c5e750fe42ebbae261302df924fb92fa.exe" ensgJJ
      2⤵
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4776
      • C:\Windows\SysWOW64\secinit.exe
        C:\Users\Admin\AppData\Roaming\UBlockPlugin\plugin.exe
        3⤵
          PID:548
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 548 -s 220
            4⤵
            • Program crash
            PID:4336
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 548 -ip 548
      1⤵
        PID:4808

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\UBlockPlugin\plugin.exe

        Filesize

        569KB

        MD5

        6af2082ed1e29b5f18e9a35e444da762

        SHA1

        9972b90aa768554f5a4304f8d351ec102f80d366

        SHA256

        290dfcde9fcb66cb3f7ed3a9de2ff1165c8128788702af81d13538f6e965b3fc

        SHA512

        c521191b4ff6f4c2ed5588ae9c62b810d8997ea3d662ccaa64fc5656173dc0222a70af7a06e1b0f25e22a8247ca21344d75d7721cf09b98e1d33ba1b87734bdf

      • C:\Users\Admin\AppData\Roaming\UBlockPlugin\plugin.exe

        Filesize

        484KB

        MD5

        e0dfe8dd5b5444874597462d639efb44

        SHA1

        2febde13ac23dbc780e8bd4d40643085c244c549

        SHA256

        e534cc8dc15432c3b5eb3109091527262462a97c68a41c8593960a8085ba0af9

        SHA512

        571c347b14fef6bfe0b23c6a946786d73eda068d1f7a7d2fd68c767c642f960982a03447d9be223cefbc7b04c91af6d339f83e39d5ffba9d00f2c3b13fdbd57b

      • memory/2432-130-0x00000000778B0000-0x0000000077A53000-memory.dmp

        Filesize

        1.6MB

      • memory/2432-131-0x000000003F400000-0x000000003F83F000-memory.dmp

        Filesize

        4.2MB

      • memory/4776-136-0x000000003FE20000-0x000000004025F000-memory.dmp

        Filesize

        4.2MB

      • memory/4776-135-0x00000000778B0000-0x0000000077A53000-memory.dmp

        Filesize

        1.6MB