Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-06-2022 08:06
Static task
static1
Behavioral task
behavioral1
Sample
796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe
Resource
win10v2004-20220414-en
General
-
Target
796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe
-
Size
1.7MB
-
MD5
d88f42698d2195f61bedb72ce885a758
-
SHA1
a7854723c51857ab0e958108be18331aa3ff8fe6
-
SHA256
796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6
-
SHA512
6be3825bed91188e6729f70fec9ac182ca9ecbdcfef970643665a1ebba9c160cfb68ae3685ce38f455b729c63c8cd2da56bf32881fe0181a4729bfbedc22d752
Malware Config
Extracted
buer
http://lodddd01.info/
http://lodddd02.info/
cook5**gj____+,)diaj*
cook5**gj____+-)diaj*
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
plugin.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\UBlockPlugin\\plugin.exe\"" plugin.exe -
Processes:
resource yara_rule behavioral2/memory/3900-134-0x000000003F210000-0x000000003F65E000-memory.dmp buer behavioral2/memory/3424-139-0x000000003F580000-0x000000003F9CE000-memory.dmp buer behavioral2/memory/3424-140-0x000000003F580000-0x000000003F9CE000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exeplugin.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ plugin.exe -
Executes dropped EXE 1 IoCs
Processes:
plugin.exepid process 3424 plugin.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exeplugin.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion plugin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion plugin.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exeplugin.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Wine 796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Wine plugin.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exeplugin.exepid process 3900 796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe 3424 plugin.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 3916 4632 WerFault.exe secinit.exe 4240 3424 WerFault.exe plugin.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exeplugin.exepid process 3900 796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe 3900 796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe 3424 plugin.exe 3424 plugin.exe 3424 plugin.exe 3424 plugin.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exeplugin.exedescription pid process target process PID 3900 wrote to memory of 3424 3900 796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe plugin.exe PID 3900 wrote to memory of 3424 3900 796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe plugin.exe PID 3900 wrote to memory of 3424 3900 796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe plugin.exe PID 3424 wrote to memory of 4632 3424 plugin.exe secinit.exe PID 3424 wrote to memory of 4632 3424 plugin.exe secinit.exe PID 3424 wrote to memory of 4632 3424 plugin.exe secinit.exe PID 3424 wrote to memory of 4632 3424 plugin.exe secinit.exe PID 3424 wrote to memory of 4632 3424 plugin.exe secinit.exe PID 3424 wrote to memory of 4632 3424 plugin.exe secinit.exe PID 3424 wrote to memory of 4632 3424 plugin.exe secinit.exe PID 3424 wrote to memory of 4632 3424 plugin.exe secinit.exe PID 3424 wrote to memory of 4632 3424 plugin.exe secinit.exe PID 3424 wrote to memory of 4632 3424 plugin.exe secinit.exe PID 3424 wrote to memory of 4632 3424 plugin.exe secinit.exe PID 3424 wrote to memory of 4632 3424 plugin.exe secinit.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe"C:\Users\Admin\AppData\Local\Temp\796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\ProgramData\UBlockPlugin\plugin.exeC:\ProgramData\UBlockPlugin\plugin.exe "C:\Users\Admin\AppData\Local\Temp\796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\UBlockPlugin\plugin.exe3⤵PID:4632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4632 -s 2204⤵
- Program crash
PID:3916
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3424 -s 11283⤵
- Program crash
PID:4240
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4632 -ip 46321⤵PID:3848
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3424 -ip 34241⤵PID:3320
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5d88f42698d2195f61bedb72ce885a758
SHA1a7854723c51857ab0e958108be18331aa3ff8fe6
SHA256796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6
SHA5126be3825bed91188e6729f70fec9ac182ca9ecbdcfef970643665a1ebba9c160cfb68ae3685ce38f455b729c63c8cd2da56bf32881fe0181a4729bfbedc22d752
-
Filesize
1.7MB
MD5d88f42698d2195f61bedb72ce885a758
SHA1a7854723c51857ab0e958108be18331aa3ff8fe6
SHA256796e1936b00307eb5d0b6af571ca8dfda475be4a4dfaacac4aa72bc1c5741aa6
SHA5126be3825bed91188e6729f70fec9ac182ca9ecbdcfef970643665a1ebba9c160cfb68ae3685ce38f455b729c63c8cd2da56bf32881fe0181a4729bfbedc22d752