Analysis
-
max time kernel
38s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 08:06
Static task
static1
Behavioral task
behavioral1
Sample
796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe
Resource
win10v2004-20220414-en
General
-
Target
796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe
-
Size
1.7MB
-
MD5
d88f42698d2195f61bedb72ce885a758
-
SHA1
a7854723c51857ab0e958108be18331aa3ff8fe6
-
SHA256
796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6
-
SHA512
6be3825bed91188e6729f70fec9ac182ca9ecbdcfef970643665a1ebba9c160cfb68ae3685ce38f455b729c63c8cd2da56bf32881fe0181a4729bfbedc22d752
Malware Config
Extracted
buer
http://lodddd01.info/
http://lodddd02.info/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\UBlockPlugin\\plugin.exe\"" plugin.exe -
resource yara_rule behavioral1/memory/240-60-0x000000003FAB0000-0x000000003FEFE000-memory.dmp buer behavioral1/memory/1160-65-0x000000003F4B0000-0x000000003F8FE000-memory.dmp buer behavioral1/memory/1160-79-0x000000003F4B0000-0x000000003F8FE000-memory.dmp buer behavioral1/memory/1160-80-0x000000003F4B0000-0x000000003F8FE000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ plugin.exe -
Executes dropped EXE 1 IoCs
pid Process 1160 plugin.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion plugin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion plugin.exe -
Deletes itself 1 IoCs
pid Process 1160 plugin.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Wine 796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Wine plugin.exe -
Loads dropped DLL 2 IoCs
pid Process 240 796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe 240 796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 240 796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe 1160 plugin.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 328 608 WerFault.exe 28 1932 1160 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 240 796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe 1160 plugin.exe 1160 plugin.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 240 wrote to memory of 1160 240 796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe 27 PID 240 wrote to memory of 1160 240 796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe 27 PID 240 wrote to memory of 1160 240 796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe 27 PID 240 wrote to memory of 1160 240 796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe 27 PID 1160 wrote to memory of 608 1160 plugin.exe 28 PID 1160 wrote to memory of 608 1160 plugin.exe 28 PID 1160 wrote to memory of 608 1160 plugin.exe 28 PID 1160 wrote to memory of 608 1160 plugin.exe 28 PID 1160 wrote to memory of 608 1160 plugin.exe 28 PID 1160 wrote to memory of 608 1160 plugin.exe 28 PID 1160 wrote to memory of 608 1160 plugin.exe 28 PID 1160 wrote to memory of 608 1160 plugin.exe 28 PID 1160 wrote to memory of 608 1160 plugin.exe 28 PID 1160 wrote to memory of 608 1160 plugin.exe 28 PID 1160 wrote to memory of 608 1160 plugin.exe 28 PID 1160 wrote to memory of 608 1160 plugin.exe 28 PID 1160 wrote to memory of 608 1160 plugin.exe 28 PID 608 wrote to memory of 328 608 secinit.exe 29 PID 608 wrote to memory of 328 608 secinit.exe 29 PID 608 wrote to memory of 328 608 secinit.exe 29 PID 608 wrote to memory of 328 608 secinit.exe 29 PID 1160 wrote to memory of 1932 1160 plugin.exe 30 PID 1160 wrote to memory of 1932 1160 plugin.exe 30 PID 1160 wrote to memory of 1932 1160 plugin.exe 30 PID 1160 wrote to memory of 1932 1160 plugin.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe"C:\Users\Admin\AppData\Local\Temp\796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:240 -
C:\ProgramData\UBlockPlugin\plugin.exeC:\ProgramData\UBlockPlugin\plugin.exe "C:\Users\Admin\AppData\Local\Temp\796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Deletes itself
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\UBlockPlugin\plugin.exe3⤵
- Suspicious use of WriteProcessMemory
PID:608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 608 -s 1364⤵
- Program crash
PID:328
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1160 -s 5643⤵
- Program crash
PID:1932
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5d88f42698d2195f61bedb72ce885a758
SHA1a7854723c51857ab0e958108be18331aa3ff8fe6
SHA256796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6
SHA5126be3825bed91188e6729f70fec9ac182ca9ecbdcfef970643665a1ebba9c160cfb68ae3685ce38f455b729c63c8cd2da56bf32881fe0181a4729bfbedc22d752
-
Filesize
1.7MB
MD5d88f42698d2195f61bedb72ce885a758
SHA1a7854723c51857ab0e958108be18331aa3ff8fe6
SHA256796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6
SHA5126be3825bed91188e6729f70fec9ac182ca9ecbdcfef970643665a1ebba9c160cfb68ae3685ce38f455b729c63c8cd2da56bf32881fe0181a4729bfbedc22d752
-
Filesize
1.7MB
MD5d88f42698d2195f61bedb72ce885a758
SHA1a7854723c51857ab0e958108be18331aa3ff8fe6
SHA256796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6
SHA5126be3825bed91188e6729f70fec9ac182ca9ecbdcfef970643665a1ebba9c160cfb68ae3685ce38f455b729c63c8cd2da56bf32881fe0181a4729bfbedc22d752
-
Filesize
1.7MB
MD5d88f42698d2195f61bedb72ce885a758
SHA1a7854723c51857ab0e958108be18331aa3ff8fe6
SHA256796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6
SHA5126be3825bed91188e6729f70fec9ac182ca9ecbdcfef970643665a1ebba9c160cfb68ae3685ce38f455b729c63c8cd2da56bf32881fe0181a4729bfbedc22d752