Analysis
-
max time kernel
43s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
30-05-2022 15:24
Static task
static1
Behavioral task
behavioral1
Sample
0a68601ec38d12ded4ece0145bda18fdae735bb1126fd8d41e04a09770cc10a7.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
0a68601ec38d12ded4ece0145bda18fdae735bb1126fd8d41e04a09770cc10a7.exe
Resource
win10v2004-20220414-en
General
-
Target
0a68601ec38d12ded4ece0145bda18fdae735bb1126fd8d41e04a09770cc10a7.exe
-
Size
1.7MB
-
MD5
0e10383cde3d4db3e32da210dbcd6efe
-
SHA1
56bcc64641acab38eff5cc62dbd7a9e1905cb51e
-
SHA256
0a68601ec38d12ded4ece0145bda18fdae735bb1126fd8d41e04a09770cc10a7
-
SHA512
4236783d09d4b8625501c622e158d604413704a6638d2b13d4ad5c8d79d02444a41515cb24fddf5dc42607da608064a736be8cc1f725ebbdfa3f0c18f5f24305
Malware Config
Extracted
buer
http://lodddd01.info/
http://lodddd02.info/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\UBlockPlugin\\plugin.exe\"" plugin.exe -
resource yara_rule behavioral1/memory/1872-60-0x000000003F1D0000-0x000000003F625000-memory.dmp buer behavioral1/memory/956-75-0x0000000077E40000-0x0000000077FC0000-memory.dmp buer behavioral1/memory/956-77-0x000000003FD80000-0x00000000401D5000-memory.dmp buer behavioral1/memory/956-81-0x000000003FD80000-0x00000000401D5000-memory.dmp buer behavioral1/memory/956-83-0x000000003FD80000-0x00000000401D5000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 956 plugin.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0a68601ec38d12ded4ece0145bda18fdae735bb1126fd8d41e04a09770cc10a7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0a68601ec38d12ded4ece0145bda18fdae735bb1126fd8d41e04a09770cc10a7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion plugin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion plugin.exe -
Deletes itself 1 IoCs
pid Process 956 plugin.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Wine plugin.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Wine 0a68601ec38d12ded4ece0145bda18fdae735bb1126fd8d41e04a09770cc10a7.exe -
Loads dropped DLL 2 IoCs
pid Process 1872 0a68601ec38d12ded4ece0145bda18fdae735bb1126fd8d41e04a09770cc10a7.exe 1872 0a68601ec38d12ded4ece0145bda18fdae735bb1126fd8d41e04a09770cc10a7.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1872 0a68601ec38d12ded4ece0145bda18fdae735bb1126fd8d41e04a09770cc10a7.exe 956 plugin.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1088 1676 WerFault.exe 29 1996 956 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1872 0a68601ec38d12ded4ece0145bda18fdae735bb1126fd8d41e04a09770cc10a7.exe 956 plugin.exe 956 plugin.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1872 wrote to memory of 956 1872 0a68601ec38d12ded4ece0145bda18fdae735bb1126fd8d41e04a09770cc10a7.exe 28 PID 1872 wrote to memory of 956 1872 0a68601ec38d12ded4ece0145bda18fdae735bb1126fd8d41e04a09770cc10a7.exe 28 PID 1872 wrote to memory of 956 1872 0a68601ec38d12ded4ece0145bda18fdae735bb1126fd8d41e04a09770cc10a7.exe 28 PID 1872 wrote to memory of 956 1872 0a68601ec38d12ded4ece0145bda18fdae735bb1126fd8d41e04a09770cc10a7.exe 28 PID 956 wrote to memory of 1676 956 plugin.exe 29 PID 956 wrote to memory of 1676 956 plugin.exe 29 PID 956 wrote to memory of 1676 956 plugin.exe 29 PID 956 wrote to memory of 1676 956 plugin.exe 29 PID 956 wrote to memory of 1676 956 plugin.exe 29 PID 956 wrote to memory of 1676 956 plugin.exe 29 PID 956 wrote to memory of 1676 956 plugin.exe 29 PID 956 wrote to memory of 1676 956 plugin.exe 29 PID 956 wrote to memory of 1676 956 plugin.exe 29 PID 956 wrote to memory of 1676 956 plugin.exe 29 PID 956 wrote to memory of 1676 956 plugin.exe 29 PID 956 wrote to memory of 1676 956 plugin.exe 29 PID 956 wrote to memory of 1676 956 plugin.exe 29 PID 1676 wrote to memory of 1088 1676 secinit.exe 30 PID 1676 wrote to memory of 1088 1676 secinit.exe 30 PID 1676 wrote to memory of 1088 1676 secinit.exe 30 PID 1676 wrote to memory of 1088 1676 secinit.exe 30 PID 956 wrote to memory of 1996 956 plugin.exe 31 PID 956 wrote to memory of 1996 956 plugin.exe 31 PID 956 wrote to memory of 1996 956 plugin.exe 31 PID 956 wrote to memory of 1996 956 plugin.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a68601ec38d12ded4ece0145bda18fdae735bb1126fd8d41e04a09770cc10a7.exe"C:\Users\Admin\AppData\Local\Temp\0a68601ec38d12ded4ece0145bda18fdae735bb1126fd8d41e04a09770cc10a7.exe"1⤵
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\ProgramData\UBlockPlugin\plugin.exeC:\ProgramData\UBlockPlugin\plugin.exe "C:\Users\Admin\AppData\Local\Temp\0a68601ec38d12ded4ece0145bda18fdae735bb1126fd8d41e04a09770cc10a7.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks BIOS information in registry
- Deletes itself
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\UBlockPlugin\plugin.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1676 -s 1364⤵
- Program crash
PID:1088
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 956 -s 5643⤵
- Program crash
PID:1996
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD50e10383cde3d4db3e32da210dbcd6efe
SHA156bcc64641acab38eff5cc62dbd7a9e1905cb51e
SHA2560a68601ec38d12ded4ece0145bda18fdae735bb1126fd8d41e04a09770cc10a7
SHA5124236783d09d4b8625501c622e158d604413704a6638d2b13d4ad5c8d79d02444a41515cb24fddf5dc42607da608064a736be8cc1f725ebbdfa3f0c18f5f24305
-
Filesize
1.7MB
MD50e10383cde3d4db3e32da210dbcd6efe
SHA156bcc64641acab38eff5cc62dbd7a9e1905cb51e
SHA2560a68601ec38d12ded4ece0145bda18fdae735bb1126fd8d41e04a09770cc10a7
SHA5124236783d09d4b8625501c622e158d604413704a6638d2b13d4ad5c8d79d02444a41515cb24fddf5dc42607da608064a736be8cc1f725ebbdfa3f0c18f5f24305
-
Filesize
1.7MB
MD50e10383cde3d4db3e32da210dbcd6efe
SHA156bcc64641acab38eff5cc62dbd7a9e1905cb51e
SHA2560a68601ec38d12ded4ece0145bda18fdae735bb1126fd8d41e04a09770cc10a7
SHA5124236783d09d4b8625501c622e158d604413704a6638d2b13d4ad5c8d79d02444a41515cb24fddf5dc42607da608064a736be8cc1f725ebbdfa3f0c18f5f24305
-
Filesize
1.7MB
MD50e10383cde3d4db3e32da210dbcd6efe
SHA156bcc64641acab38eff5cc62dbd7a9e1905cb51e
SHA2560a68601ec38d12ded4ece0145bda18fdae735bb1126fd8d41e04a09770cc10a7
SHA5124236783d09d4b8625501c622e158d604413704a6638d2b13d4ad5c8d79d02444a41515cb24fddf5dc42607da608064a736be8cc1f725ebbdfa3f0c18f5f24305