Analysis
-
max time kernel
43s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
12-06-2022 23:39
Static task
static1
Behavioral task
behavioral1
Sample
1db9d9d597636fb6e579a91b9206ac25e93e912c9fbfc91f604b7b1f0e18cc0a.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1db9d9d597636fb6e579a91b9206ac25e93e912c9fbfc91f604b7b1f0e18cc0a.exe
Resource
win10v2004-20220414-en
General
-
Target
1db9d9d597636fb6e579a91b9206ac25e93e912c9fbfc91f604b7b1f0e18cc0a.exe
-
Size
2.0MB
-
MD5
907c5f834992bd50e09e7722c0cce2e3
-
SHA1
ba09efb22778621d40b624fb423884312e88428c
-
SHA256
1db9d9d597636fb6e579a91b9206ac25e93e912c9fbfc91f604b7b1f0e18cc0a
-
SHA512
519492e11ee14bce94966d7697094baf4b8135ca587dad061c7f3f13f6561aa4783fe7411dffac27de1c0d3add2a1311d48b2b1d4cef132d69096b841c76eb05
Malware Config
Extracted
buer
http://loood1.top/
http://loood2.top/
Signatures
-
resource yara_rule behavioral1/memory/812-59-0x000000003F780000-0x000000003FC56000-memory.dmp buer behavioral1/memory/812-60-0x0000000077A20000-0x0000000077BA0000-memory.dmp buer behavioral1/memory/1732-74-0x000000003F310000-0x000000003F7E6000-memory.dmp buer behavioral1/memory/1732-82-0x000000003F310000-0x000000003F7E6000-memory.dmp buer behavioral1/memory/1732-83-0x000000003F310000-0x000000003F7E6000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1db9d9d597636fb6e579a91b9206ac25e93e912c9fbfc91f604b7b1f0e18cc0a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ manager.exe -
Executes dropped EXE 1 IoCs
pid Process 1732 manager.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1db9d9d597636fb6e579a91b9206ac25e93e912c9fbfc91f604b7b1f0e18cc0a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1db9d9d597636fb6e579a91b9206ac25e93e912c9fbfc91f604b7b1f0e18cc0a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion manager.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion manager.exe -
Deletes itself 1 IoCs
pid Process 1732 manager.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Wine 1db9d9d597636fb6e579a91b9206ac25e93e912c9fbfc91f604b7b1f0e18cc0a.exe Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Wine manager.exe -
Loads dropped DLL 2 IoCs
pid Process 812 1db9d9d597636fb6e579a91b9206ac25e93e912c9fbfc91f604b7b1f0e18cc0a.exe 812 1db9d9d597636fb6e579a91b9206ac25e93e912c9fbfc91f604b7b1f0e18cc0a.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce manager.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ActiveX Component = "C:\\Users\\Admin\\AppData\\Roaming\\ActiveX\\manager.exe" manager.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 812 1db9d9d597636fb6e579a91b9206ac25e93e912c9fbfc91f604b7b1f0e18cc0a.exe 1732 manager.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 812 1db9d9d597636fb6e579a91b9206ac25e93e912c9fbfc91f604b7b1f0e18cc0a.exe 1732 manager.exe 1732 manager.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 812 wrote to memory of 1732 812 1db9d9d597636fb6e579a91b9206ac25e93e912c9fbfc91f604b7b1f0e18cc0a.exe 27 PID 812 wrote to memory of 1732 812 1db9d9d597636fb6e579a91b9206ac25e93e912c9fbfc91f604b7b1f0e18cc0a.exe 27 PID 812 wrote to memory of 1732 812 1db9d9d597636fb6e579a91b9206ac25e93e912c9fbfc91f604b7b1f0e18cc0a.exe 27 PID 812 wrote to memory of 1732 812 1db9d9d597636fb6e579a91b9206ac25e93e912c9fbfc91f604b7b1f0e18cc0a.exe 27 PID 1732 wrote to memory of 1808 1732 manager.exe 28 PID 1732 wrote to memory of 1808 1732 manager.exe 28 PID 1732 wrote to memory of 1808 1732 manager.exe 28 PID 1732 wrote to memory of 1808 1732 manager.exe 28 PID 1732 wrote to memory of 1808 1732 manager.exe 28 PID 1732 wrote to memory of 1808 1732 manager.exe 28 PID 1732 wrote to memory of 1808 1732 manager.exe 28 PID 1732 wrote to memory of 1808 1732 manager.exe 28 PID 1732 wrote to memory of 1808 1732 manager.exe 28 PID 1732 wrote to memory of 1808 1732 manager.exe 28 PID 1732 wrote to memory of 1808 1732 manager.exe 28 PID 1732 wrote to memory of 1808 1732 manager.exe 28 PID 1732 wrote to memory of 1808 1732 manager.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1db9d9d597636fb6e579a91b9206ac25e93e912c9fbfc91f604b7b1f0e18cc0a.exe"C:\Users\Admin\AppData\Local\Temp\1db9d9d597636fb6e579a91b9206ac25e93e912c9fbfc91f604b7b1f0e18cc0a.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Users\Admin\AppData\Roaming\ActiveX\manager.exeC:\Users\Admin\AppData\Roaming\ActiveX\manager.exe "C:\Users\Admin\AppData\Local\Temp\1db9d9d597636fb6e579a91b9206ac25e93e912c9fbfc91f604b7b1f0e18cc0a.exe" ensgJJ2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Deletes itself
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\secinit.exeC:\Users\Admin\AppData\Roaming\ActiveX\manager.exe3⤵PID:1808
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5907c5f834992bd50e09e7722c0cce2e3
SHA1ba09efb22778621d40b624fb423884312e88428c
SHA2561db9d9d597636fb6e579a91b9206ac25e93e912c9fbfc91f604b7b1f0e18cc0a
SHA512519492e11ee14bce94966d7697094baf4b8135ca587dad061c7f3f13f6561aa4783fe7411dffac27de1c0d3add2a1311d48b2b1d4cef132d69096b841c76eb05
-
Filesize
2.0MB
MD5907c5f834992bd50e09e7722c0cce2e3
SHA1ba09efb22778621d40b624fb423884312e88428c
SHA2561db9d9d597636fb6e579a91b9206ac25e93e912c9fbfc91f604b7b1f0e18cc0a
SHA512519492e11ee14bce94966d7697094baf4b8135ca587dad061c7f3f13f6561aa4783fe7411dffac27de1c0d3add2a1311d48b2b1d4cef132d69096b841c76eb05
-
Filesize
2.0MB
MD5907c5f834992bd50e09e7722c0cce2e3
SHA1ba09efb22778621d40b624fb423884312e88428c
SHA2561db9d9d597636fb6e579a91b9206ac25e93e912c9fbfc91f604b7b1f0e18cc0a
SHA512519492e11ee14bce94966d7697094baf4b8135ca587dad061c7f3f13f6561aa4783fe7411dffac27de1c0d3add2a1311d48b2b1d4cef132d69096b841c76eb05
-
Filesize
2.0MB
MD5907c5f834992bd50e09e7722c0cce2e3
SHA1ba09efb22778621d40b624fb423884312e88428c
SHA2561db9d9d597636fb6e579a91b9206ac25e93e912c9fbfc91f604b7b1f0e18cc0a
SHA512519492e11ee14bce94966d7697094baf4b8135ca587dad061c7f3f13f6561aa4783fe7411dffac27de1c0d3add2a1311d48b2b1d4cef132d69096b841c76eb05