Analysis
-
max time kernel
41s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 08:09
Static task
static1
Behavioral task
behavioral1
Sample
6d4500bced3441879c63efbdc73e4742e111f011627343b8f3f607101668ac5c.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
6d4500bced3441879c63efbdc73e4742e111f011627343b8f3f607101668ac5c.exe
Resource
win10v2004-20220414-en
General
-
Target
6d4500bced3441879c63efbdc73e4742e111f011627343b8f3f607101668ac5c.exe
-
Size
1.7MB
-
MD5
32855c905d8fc616ee5feb354820ba97
-
SHA1
92178e3e2294a39588571e165393b18e1867ab5b
-
SHA256
6d4500bced3441879c63efbdc73e4742e111f011627343b8f3f607101668ac5c
-
SHA512
eee2b54bf408286784f4b9c8be49035227238cc7a804a4c60edd42b480a6527b0a217fa354cbe588e059c8c3a1dde9f2afd5d3b0f6fbbea107d08d1a6e1c3ca9
Malware Config
Extracted
buer
http://lodddd01.info/
http://lodddd02.info/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\UBlockPlugin\\plugin.exe\"" plugin.exe -
resource yara_rule behavioral1/memory/1992-60-0x000000003F8C0000-0x000000003FD09000-memory.dmp buer behavioral1/memory/1792-64-0x000000003FA80000-0x000000003FEC9000-memory.dmp buer behavioral1/memory/1792-66-0x000000003FA80000-0x000000003FEC9000-memory.dmp buer behavioral1/memory/1792-68-0x000000003FA80000-0x000000003FEC9000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ plugin.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6d4500bced3441879c63efbdc73e4742e111f011627343b8f3f607101668ac5c.exe -
Executes dropped EXE 1 IoCs
pid Process 1792 plugin.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6d4500bced3441879c63efbdc73e4742e111f011627343b8f3f607101668ac5c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6d4500bced3441879c63efbdc73e4742e111f011627343b8f3f607101668ac5c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion plugin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion plugin.exe -
Deletes itself 1 IoCs
pid Process 1792 plugin.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Wine 6d4500bced3441879c63efbdc73e4742e111f011627343b8f3f607101668ac5c.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Wine plugin.exe -
Loads dropped DLL 2 IoCs
pid Process 1992 6d4500bced3441879c63efbdc73e4742e111f011627343b8f3f607101668ac5c.exe 1992 6d4500bced3441879c63efbdc73e4742e111f011627343b8f3f607101668ac5c.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1992 6d4500bced3441879c63efbdc73e4742e111f011627343b8f3f607101668ac5c.exe 1792 plugin.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 976 1792 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1992 6d4500bced3441879c63efbdc73e4742e111f011627343b8f3f607101668ac5c.exe 1792 plugin.exe 1792 plugin.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1992 wrote to memory of 1792 1992 6d4500bced3441879c63efbdc73e4742e111f011627343b8f3f607101668ac5c.exe 27 PID 1992 wrote to memory of 1792 1992 6d4500bced3441879c63efbdc73e4742e111f011627343b8f3f607101668ac5c.exe 27 PID 1992 wrote to memory of 1792 1992 6d4500bced3441879c63efbdc73e4742e111f011627343b8f3f607101668ac5c.exe 27 PID 1992 wrote to memory of 1792 1992 6d4500bced3441879c63efbdc73e4742e111f011627343b8f3f607101668ac5c.exe 27 PID 1792 wrote to memory of 752 1792 plugin.exe 28 PID 1792 wrote to memory of 752 1792 plugin.exe 28 PID 1792 wrote to memory of 752 1792 plugin.exe 28 PID 1792 wrote to memory of 752 1792 plugin.exe 28 PID 1792 wrote to memory of 976 1792 plugin.exe 29 PID 1792 wrote to memory of 976 1792 plugin.exe 29 PID 1792 wrote to memory of 976 1792 plugin.exe 29 PID 1792 wrote to memory of 976 1792 plugin.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d4500bced3441879c63efbdc73e4742e111f011627343b8f3f607101668ac5c.exe"C:\Users\Admin\AppData\Local\Temp\6d4500bced3441879c63efbdc73e4742e111f011627343b8f3f607101668ac5c.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\ProgramData\UBlockPlugin\plugin.exeC:\ProgramData\UBlockPlugin\plugin.exe "C:\Users\Admin\AppData\Local\Temp\6d4500bced3441879c63efbdc73e4742e111f011627343b8f3f607101668ac5c.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Deletes itself
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\UBlockPlugin\plugin.exe3⤵PID:752
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1792 -s 5563⤵
- Program crash
PID:976
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD532855c905d8fc616ee5feb354820ba97
SHA192178e3e2294a39588571e165393b18e1867ab5b
SHA2566d4500bced3441879c63efbdc73e4742e111f011627343b8f3f607101668ac5c
SHA512eee2b54bf408286784f4b9c8be49035227238cc7a804a4c60edd42b480a6527b0a217fa354cbe588e059c8c3a1dde9f2afd5d3b0f6fbbea107d08d1a6e1c3ca9
-
Filesize
1.7MB
MD532855c905d8fc616ee5feb354820ba97
SHA192178e3e2294a39588571e165393b18e1867ab5b
SHA2566d4500bced3441879c63efbdc73e4742e111f011627343b8f3f607101668ac5c
SHA512eee2b54bf408286784f4b9c8be49035227238cc7a804a4c60edd42b480a6527b0a217fa354cbe588e059c8c3a1dde9f2afd5d3b0f6fbbea107d08d1a6e1c3ca9
-
Filesize
1.7MB
MD532855c905d8fc616ee5feb354820ba97
SHA192178e3e2294a39588571e165393b18e1867ab5b
SHA2566d4500bced3441879c63efbdc73e4742e111f011627343b8f3f607101668ac5c
SHA512eee2b54bf408286784f4b9c8be49035227238cc7a804a4c60edd42b480a6527b0a217fa354cbe588e059c8c3a1dde9f2afd5d3b0f6fbbea107d08d1a6e1c3ca9
-
Filesize
1.7MB
MD532855c905d8fc616ee5feb354820ba97
SHA192178e3e2294a39588571e165393b18e1867ab5b
SHA2566d4500bced3441879c63efbdc73e4742e111f011627343b8f3f607101668ac5c
SHA512eee2b54bf408286784f4b9c8be49035227238cc7a804a4c60edd42b480a6527b0a217fa354cbe588e059c8c3a1dde9f2afd5d3b0f6fbbea107d08d1a6e1c3ca9