Analysis
-
max time kernel
38s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 08:06
Static task
static1
Behavioral task
behavioral1
Sample
796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe
Resource
win10v2004-20220414-en
General
-
Target
796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe
-
Size
1.7MB
-
MD5
d88f42698d2195f61bedb72ce885a758
-
SHA1
a7854723c51857ab0e958108be18331aa3ff8fe6
-
SHA256
796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6
-
SHA512
6be3825bed91188e6729f70fec9ac182ca9ecbdcfef970643665a1ebba9c160cfb68ae3685ce38f455b729c63c8cd2da56bf32881fe0181a4729bfbedc22d752
Malware Config
Extracted
buer
http://lodddd01.info/
http://lodddd02.info/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
plugin.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\UBlockPlugin\\plugin.exe\"" plugin.exe -
Processes:
resource yara_rule behavioral1/memory/240-60-0x000000003FAB0000-0x000000003FEFE000-memory.dmp buer behavioral1/memory/1160-65-0x000000003F4B0000-0x000000003F8FE000-memory.dmp buer behavioral1/memory/1160-79-0x000000003F4B0000-0x000000003F8FE000-memory.dmp buer behavioral1/memory/1160-80-0x000000003F4B0000-0x000000003F8FE000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exeplugin.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ plugin.exe -
Executes dropped EXE 1 IoCs
Processes:
plugin.exepid process 1160 plugin.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
plugin.exe796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion plugin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion plugin.exe -
Deletes itself 1 IoCs
Processes:
plugin.exepid process 1160 plugin.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exeplugin.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Wine 796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Wine plugin.exe -
Loads dropped DLL 2 IoCs
Processes:
796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exepid process 240 796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe 240 796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exeplugin.exepid process 240 796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe 1160 plugin.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 328 608 WerFault.exe secinit.exe 1932 1160 WerFault.exe plugin.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exeplugin.exepid process 240 796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe 1160 plugin.exe 1160 plugin.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exeplugin.exesecinit.exedescription pid process target process PID 240 wrote to memory of 1160 240 796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe plugin.exe PID 240 wrote to memory of 1160 240 796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe plugin.exe PID 240 wrote to memory of 1160 240 796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe plugin.exe PID 240 wrote to memory of 1160 240 796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe plugin.exe PID 1160 wrote to memory of 608 1160 plugin.exe secinit.exe PID 1160 wrote to memory of 608 1160 plugin.exe secinit.exe PID 1160 wrote to memory of 608 1160 plugin.exe secinit.exe PID 1160 wrote to memory of 608 1160 plugin.exe secinit.exe PID 1160 wrote to memory of 608 1160 plugin.exe secinit.exe PID 1160 wrote to memory of 608 1160 plugin.exe secinit.exe PID 1160 wrote to memory of 608 1160 plugin.exe secinit.exe PID 1160 wrote to memory of 608 1160 plugin.exe secinit.exe PID 1160 wrote to memory of 608 1160 plugin.exe secinit.exe PID 1160 wrote to memory of 608 1160 plugin.exe secinit.exe PID 1160 wrote to memory of 608 1160 plugin.exe secinit.exe PID 1160 wrote to memory of 608 1160 plugin.exe secinit.exe PID 1160 wrote to memory of 608 1160 plugin.exe secinit.exe PID 608 wrote to memory of 328 608 secinit.exe WerFault.exe PID 608 wrote to memory of 328 608 secinit.exe WerFault.exe PID 608 wrote to memory of 328 608 secinit.exe WerFault.exe PID 608 wrote to memory of 328 608 secinit.exe WerFault.exe PID 1160 wrote to memory of 1932 1160 plugin.exe WerFault.exe PID 1160 wrote to memory of 1932 1160 plugin.exe WerFault.exe PID 1160 wrote to memory of 1932 1160 plugin.exe WerFault.exe PID 1160 wrote to memory of 1932 1160 plugin.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe"C:\Users\Admin\AppData\Local\Temp\796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:240 -
C:\ProgramData\UBlockPlugin\plugin.exeC:\ProgramData\UBlockPlugin\plugin.exe "C:\Users\Admin\AppData\Local\Temp\796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Deletes itself
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\UBlockPlugin\plugin.exe3⤵
- Suspicious use of WriteProcessMemory
PID:608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 608 -s 1364⤵
- Program crash
PID:328
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1160 -s 5643⤵
- Program crash
PID:1932
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5d88f42698d2195f61bedb72ce885a758
SHA1a7854723c51857ab0e958108be18331aa3ff8fe6
SHA256796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6
SHA5126be3825bed91188e6729f70fec9ac182ca9ecbdcfef970643665a1ebba9c160cfb68ae3685ce38f455b729c63c8cd2da56bf32881fe0181a4729bfbedc22d752
-
Filesize
1.7MB
MD5d88f42698d2195f61bedb72ce885a758
SHA1a7854723c51857ab0e958108be18331aa3ff8fe6
SHA256796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6
SHA5126be3825bed91188e6729f70fec9ac182ca9ecbdcfef970643665a1ebba9c160cfb68ae3685ce38f455b729c63c8cd2da56bf32881fe0181a4729bfbedc22d752
-
Filesize
1.7MB
MD5d88f42698d2195f61bedb72ce885a758
SHA1a7854723c51857ab0e958108be18331aa3ff8fe6
SHA256796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6
SHA5126be3825bed91188e6729f70fec9ac182ca9ecbdcfef970643665a1ebba9c160cfb68ae3685ce38f455b729c63c8cd2da56bf32881fe0181a4729bfbedc22d752
-
Filesize
1.7MB
MD5d88f42698d2195f61bedb72ce885a758
SHA1a7854723c51857ab0e958108be18331aa3ff8fe6
SHA256796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6
SHA5126be3825bed91188e6729f70fec9ac182ca9ecbdcfef970643665a1ebba9c160cfb68ae3685ce38f455b729c63c8cd2da56bf32881fe0181a4729bfbedc22d752