Analysis
-
max time kernel
152s -
max time network
173s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-06-2022 08:09
Static task
static1
Behavioral task
behavioral1
Sample
6d4500bced3441879c63efbdc73e4742e111f011627343b8f3f607101668ac5c.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
6d4500bced3441879c63efbdc73e4742e111f011627343b8f3f607101668ac5c.exe
Resource
win10v2004-20220414-en
General
-
Target
6d4500bced3441879c63efbdc73e4742e111f011627343b8f3f607101668ac5c.exe
-
Size
1.7MB
-
MD5
32855c905d8fc616ee5feb354820ba97
-
SHA1
92178e3e2294a39588571e165393b18e1867ab5b
-
SHA256
6d4500bced3441879c63efbdc73e4742e111f011627343b8f3f607101668ac5c
-
SHA512
eee2b54bf408286784f4b9c8be49035227238cc7a804a4c60edd42b480a6527b0a217fa354cbe588e059c8c3a1dde9f2afd5d3b0f6fbbea107d08d1a6e1c3ca9
Malware Config
Extracted
buer
http://lodddd01.info/
http://lodddd02.info/
cook5**gj____+,)diaj*
cook5**gj____+-)diaj*
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\UBlockPlugin\\plugin.exe\"" plugin.exe -
resource yara_rule behavioral2/memory/532-134-0x000000003F270000-0x000000003F6B9000-memory.dmp buer behavioral2/memory/2284-139-0x000000003F200000-0x000000003F649000-memory.dmp buer behavioral2/memory/2284-140-0x000000003F200000-0x000000003F649000-memory.dmp buer behavioral2/memory/2284-142-0x000000003F200000-0x000000003F649000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6d4500bced3441879c63efbdc73e4742e111f011627343b8f3f607101668ac5c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ plugin.exe -
Executes dropped EXE 1 IoCs
pid Process 2284 plugin.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6d4500bced3441879c63efbdc73e4742e111f011627343b8f3f607101668ac5c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion plugin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion plugin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6d4500bced3441879c63efbdc73e4742e111f011627343b8f3f607101668ac5c.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Wine 6d4500bced3441879c63efbdc73e4742e111f011627343b8f3f607101668ac5c.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Wine plugin.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 532 6d4500bced3441879c63efbdc73e4742e111f011627343b8f3f607101668ac5c.exe 2284 plugin.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4976 5080 WerFault.exe 81 4172 2284 WerFault.exe 80 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 532 6d4500bced3441879c63efbdc73e4742e111f011627343b8f3f607101668ac5c.exe 532 6d4500bced3441879c63efbdc73e4742e111f011627343b8f3f607101668ac5c.exe 2284 plugin.exe 2284 plugin.exe 2284 plugin.exe 2284 plugin.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 532 wrote to memory of 2284 532 6d4500bced3441879c63efbdc73e4742e111f011627343b8f3f607101668ac5c.exe 80 PID 532 wrote to memory of 2284 532 6d4500bced3441879c63efbdc73e4742e111f011627343b8f3f607101668ac5c.exe 80 PID 532 wrote to memory of 2284 532 6d4500bced3441879c63efbdc73e4742e111f011627343b8f3f607101668ac5c.exe 80 PID 2284 wrote to memory of 5080 2284 plugin.exe 81 PID 2284 wrote to memory of 5080 2284 plugin.exe 81 PID 2284 wrote to memory of 5080 2284 plugin.exe 81 PID 2284 wrote to memory of 5080 2284 plugin.exe 81 PID 2284 wrote to memory of 5080 2284 plugin.exe 81 PID 2284 wrote to memory of 5080 2284 plugin.exe 81 PID 2284 wrote to memory of 5080 2284 plugin.exe 81 PID 2284 wrote to memory of 5080 2284 plugin.exe 81 PID 2284 wrote to memory of 5080 2284 plugin.exe 81 PID 2284 wrote to memory of 5080 2284 plugin.exe 81 PID 2284 wrote to memory of 5080 2284 plugin.exe 81 PID 2284 wrote to memory of 5080 2284 plugin.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d4500bced3441879c63efbdc73e4742e111f011627343b8f3f607101668ac5c.exe"C:\Users\Admin\AppData\Local\Temp\6d4500bced3441879c63efbdc73e4742e111f011627343b8f3f607101668ac5c.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:532 -
C:\ProgramData\UBlockPlugin\plugin.exeC:\ProgramData\UBlockPlugin\plugin.exe "C:\Users\Admin\AppData\Local\Temp\6d4500bced3441879c63efbdc73e4742e111f011627343b8f3f607101668ac5c.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\UBlockPlugin\plugin.exe3⤵PID:5080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 2204⤵
- Program crash
PID:4976
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2284 -s 10203⤵
- Program crash
PID:4172
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 5080 -ip 50801⤵PID:892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2284 -ip 22841⤵PID:628
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD532855c905d8fc616ee5feb354820ba97
SHA192178e3e2294a39588571e165393b18e1867ab5b
SHA2566d4500bced3441879c63efbdc73e4742e111f011627343b8f3f607101668ac5c
SHA512eee2b54bf408286784f4b9c8be49035227238cc7a804a4c60edd42b480a6527b0a217fa354cbe588e059c8c3a1dde9f2afd5d3b0f6fbbea107d08d1a6e1c3ca9
-
Filesize
1.7MB
MD532855c905d8fc616ee5feb354820ba97
SHA192178e3e2294a39588571e165393b18e1867ab5b
SHA2566d4500bced3441879c63efbdc73e4742e111f011627343b8f3f607101668ac5c
SHA512eee2b54bf408286784f4b9c8be49035227238cc7a804a4c60edd42b480a6527b0a217fa354cbe588e059c8c3a1dde9f2afd5d3b0f6fbbea107d08d1a6e1c3ca9