Analysis
-
max time kernel
179s -
max time network
211s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-06-2022 02:52
Static task
static1
Behavioral task
behavioral1
Sample
e569998290b8e57cbfeea4f35425d6c79e4a6cf1bf56b316c01d8f91d269396f.exe
Resource
win7-20220414-en
General
-
Target
e569998290b8e57cbfeea4f35425d6c79e4a6cf1bf56b316c01d8f91d269396f.exe
-
Size
1.6MB
-
MD5
362073a5ce3273ad4dcfc8e6c47ec3ca
-
SHA1
7948c767c9d666b4fd73d7b6180c5fd78c302ac1
-
SHA256
e569998290b8e57cbfeea4f35425d6c79e4a6cf1bf56b316c01d8f91d269396f
-
SHA512
15d048fbb1ab5da75818a1ea21a1d7ed4f97b394281c677c7e7a08c1291cb514500ef3078ae358d1e1eb5c9bb294ebacf075f3b3b40631bce01c92d8f00c0377
Malware Config
Extracted
buer
https://loddd01.info/
https://loddd02.info/
Signatures
-
resource yara_rule behavioral2/memory/4804-132-0x000000003F4D0000-0x000000003F916000-memory.dmp buer behavioral2/memory/4804-133-0x000000003F4D0000-0x000000003F916000-memory.dmp buer behavioral2/memory/4804-134-0x000000003F4D0000-0x000000003F916000-memory.dmp buer behavioral2/memory/4804-138-0x000000003F4D0000-0x000000003F916000-memory.dmp buer behavioral2/memory/1396-142-0x000000003FCD0000-0x0000000040116000-memory.dmp buer behavioral2/memory/1396-143-0x000000003FCD0000-0x0000000040116000-memory.dmp buer behavioral2/memory/1396-144-0x000000003FCD0000-0x0000000040116000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e569998290b8e57cbfeea4f35425d6c79e4a6cf1bf56b316c01d8f91d269396f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ plugin.exe -
Executes dropped EXE 1 IoCs
pid Process 1396 plugin.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e569998290b8e57cbfeea4f35425d6c79e4a6cf1bf56b316c01d8f91d269396f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e569998290b8e57cbfeea4f35425d6c79e4a6cf1bf56b316c01d8f91d269396f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion plugin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion plugin.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Wine e569998290b8e57cbfeea4f35425d6c79e4a6cf1bf56b316c01d8f91d269396f.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Wine plugin.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4804 e569998290b8e57cbfeea4f35425d6c79e4a6cf1bf56b316c01d8f91d269396f.exe 1396 plugin.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 5096 3228 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4804 e569998290b8e57cbfeea4f35425d6c79e4a6cf1bf56b316c01d8f91d269396f.exe 4804 e569998290b8e57cbfeea4f35425d6c79e4a6cf1bf56b316c01d8f91d269396f.exe 1396 plugin.exe 1396 plugin.exe 1396 plugin.exe 1396 plugin.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4804 wrote to memory of 1396 4804 e569998290b8e57cbfeea4f35425d6c79e4a6cf1bf56b316c01d8f91d269396f.exe 87 PID 4804 wrote to memory of 1396 4804 e569998290b8e57cbfeea4f35425d6c79e4a6cf1bf56b316c01d8f91d269396f.exe 87 PID 4804 wrote to memory of 1396 4804 e569998290b8e57cbfeea4f35425d6c79e4a6cf1bf56b316c01d8f91d269396f.exe 87 PID 1396 wrote to memory of 3228 1396 plugin.exe 90 PID 1396 wrote to memory of 3228 1396 plugin.exe 90 PID 1396 wrote to memory of 3228 1396 plugin.exe 90 PID 1396 wrote to memory of 3228 1396 plugin.exe 90 PID 1396 wrote to memory of 3228 1396 plugin.exe 90 PID 1396 wrote to memory of 3228 1396 plugin.exe 90 PID 1396 wrote to memory of 3228 1396 plugin.exe 90 PID 1396 wrote to memory of 3228 1396 plugin.exe 90 PID 1396 wrote to memory of 3228 1396 plugin.exe 90 PID 1396 wrote to memory of 3228 1396 plugin.exe 90 PID 1396 wrote to memory of 3228 1396 plugin.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\e569998290b8e57cbfeea4f35425d6c79e4a6cf1bf56b316c01d8f91d269396f.exe"C:\Users\Admin\AppData\Local\Temp\e569998290b8e57cbfeea4f35425d6c79e4a6cf1bf56b316c01d8f91d269396f.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\ProgramData\UBlockPlugin\plugin.exeC:\ProgramData\UBlockPlugin\plugin.exe "C:\Users\Admin\AppData\Local\Temp\e569998290b8e57cbfeea4f35425d6c79e4a6cf1bf56b316c01d8f91d269396f.exe" ensgJJ2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\UBlockPlugin\plugin.exe3⤵PID:3228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3228 -s 2204⤵
- Program crash
PID:5096
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3228 -ip 32281⤵PID:1864
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5362073a5ce3273ad4dcfc8e6c47ec3ca
SHA17948c767c9d666b4fd73d7b6180c5fd78c302ac1
SHA256e569998290b8e57cbfeea4f35425d6c79e4a6cf1bf56b316c01d8f91d269396f
SHA51215d048fbb1ab5da75818a1ea21a1d7ed4f97b394281c677c7e7a08c1291cb514500ef3078ae358d1e1eb5c9bb294ebacf075f3b3b40631bce01c92d8f00c0377
-
Filesize
1.6MB
MD5362073a5ce3273ad4dcfc8e6c47ec3ca
SHA17948c767c9d666b4fd73d7b6180c5fd78c302ac1
SHA256e569998290b8e57cbfeea4f35425d6c79e4a6cf1bf56b316c01d8f91d269396f
SHA51215d048fbb1ab5da75818a1ea21a1d7ed4f97b394281c677c7e7a08c1291cb514500ef3078ae358d1e1eb5c9bb294ebacf075f3b3b40631bce01c92d8f00c0377