Analysis
-
max time kernel
91s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
30-05-2022 15:24
Static task
static1
Behavioral task
behavioral1
Sample
0a68601ec38d12ded4ece0145bda18fdae735bb1126fd8d41e04a09770cc10a7.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
0a68601ec38d12ded4ece0145bda18fdae735bb1126fd8d41e04a09770cc10a7.exe
Resource
win10v2004-20220414-en
General
-
Target
0a68601ec38d12ded4ece0145bda18fdae735bb1126fd8d41e04a09770cc10a7.exe
-
Size
1.7MB
-
MD5
0e10383cde3d4db3e32da210dbcd6efe
-
SHA1
56bcc64641acab38eff5cc62dbd7a9e1905cb51e
-
SHA256
0a68601ec38d12ded4ece0145bda18fdae735bb1126fd8d41e04a09770cc10a7
-
SHA512
4236783d09d4b8625501c622e158d604413704a6638d2b13d4ad5c8d79d02444a41515cb24fddf5dc42607da608064a736be8cc1f725ebbdfa3f0c18f5f24305
Malware Config
Extracted
buer
http://lodddd01.info/
http://lodddd02.info/
cook5**gj____+,)diaj*
cook5**gj____+-)diaj*
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\UBlockPlugin\\plugin.exe\"" plugin.exe -
resource yara_rule behavioral2/memory/4908-135-0x000000003F8F0000-0x000000003FD45000-memory.dmp buer behavioral2/memory/740-139-0x000000003F8C0000-0x000000003FD15000-memory.dmp buer behavioral2/memory/740-141-0x000000003F8C0000-0x000000003FD15000-memory.dmp buer behavioral2/memory/740-143-0x000000003F8C0000-0x000000003FD15000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 740 plugin.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion plugin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion plugin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0a68601ec38d12ded4ece0145bda18fdae735bb1126fd8d41e04a09770cc10a7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0a68601ec38d12ded4ece0145bda18fdae735bb1126fd8d41e04a09770cc10a7.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Wine 0a68601ec38d12ded4ece0145bda18fdae735bb1126fd8d41e04a09770cc10a7.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Wine plugin.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4908 0a68601ec38d12ded4ece0145bda18fdae735bb1126fd8d41e04a09770cc10a7.exe 740 plugin.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1092 3440 WerFault.exe 82 1672 740 WerFault.exe 81 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4908 0a68601ec38d12ded4ece0145bda18fdae735bb1126fd8d41e04a09770cc10a7.exe 4908 0a68601ec38d12ded4ece0145bda18fdae735bb1126fd8d41e04a09770cc10a7.exe 740 plugin.exe 740 plugin.exe 740 plugin.exe 740 plugin.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4908 wrote to memory of 740 4908 0a68601ec38d12ded4ece0145bda18fdae735bb1126fd8d41e04a09770cc10a7.exe 81 PID 4908 wrote to memory of 740 4908 0a68601ec38d12ded4ece0145bda18fdae735bb1126fd8d41e04a09770cc10a7.exe 81 PID 4908 wrote to memory of 740 4908 0a68601ec38d12ded4ece0145bda18fdae735bb1126fd8d41e04a09770cc10a7.exe 81 PID 740 wrote to memory of 3440 740 plugin.exe 82 PID 740 wrote to memory of 3440 740 plugin.exe 82 PID 740 wrote to memory of 3440 740 plugin.exe 82 PID 740 wrote to memory of 3440 740 plugin.exe 82 PID 740 wrote to memory of 3440 740 plugin.exe 82 PID 740 wrote to memory of 3440 740 plugin.exe 82 PID 740 wrote to memory of 3440 740 plugin.exe 82 PID 740 wrote to memory of 3440 740 plugin.exe 82 PID 740 wrote to memory of 3440 740 plugin.exe 82 PID 740 wrote to memory of 3440 740 plugin.exe 82 PID 740 wrote to memory of 3440 740 plugin.exe 82 PID 740 wrote to memory of 3440 740 plugin.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a68601ec38d12ded4ece0145bda18fdae735bb1126fd8d41e04a09770cc10a7.exe"C:\Users\Admin\AppData\Local\Temp\0a68601ec38d12ded4ece0145bda18fdae735bb1126fd8d41e04a09770cc10a7.exe"1⤵
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\ProgramData\UBlockPlugin\plugin.exeC:\ProgramData\UBlockPlugin\plugin.exe "C:\Users\Admin\AppData\Local\Temp\0a68601ec38d12ded4ece0145bda18fdae735bb1126fd8d41e04a09770cc10a7.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\UBlockPlugin\plugin.exe3⤵PID:3440
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3440 -s 2204⤵
- Program crash
PID:1092
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 740 -s 11763⤵
- Program crash
PID:1672
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3440 -ip 34401⤵PID:952
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 740 -ip 7401⤵PID:1800
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD50e10383cde3d4db3e32da210dbcd6efe
SHA156bcc64641acab38eff5cc62dbd7a9e1905cb51e
SHA2560a68601ec38d12ded4ece0145bda18fdae735bb1126fd8d41e04a09770cc10a7
SHA5124236783d09d4b8625501c622e158d604413704a6638d2b13d4ad5c8d79d02444a41515cb24fddf5dc42607da608064a736be8cc1f725ebbdfa3f0c18f5f24305
-
Filesize
1.7MB
MD50e10383cde3d4db3e32da210dbcd6efe
SHA156bcc64641acab38eff5cc62dbd7a9e1905cb51e
SHA2560a68601ec38d12ded4ece0145bda18fdae735bb1126fd8d41e04a09770cc10a7
SHA5124236783d09d4b8625501c622e158d604413704a6638d2b13d4ad5c8d79d02444a41515cb24fddf5dc42607da608064a736be8cc1f725ebbdfa3f0c18f5f24305