Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-06-2022 11:17
Static task
static1
Behavioral task
behavioral1
Sample
99ecaff6fefedf3b7b7d6d0dba4d15c55ca1a7d57a19e04c38908f02a1f9ca22.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
99ecaff6fefedf3b7b7d6d0dba4d15c55ca1a7d57a19e04c38908f02a1f9ca22.exe
Resource
win10v2004-20220414-en
General
-
Target
99ecaff6fefedf3b7b7d6d0dba4d15c55ca1a7d57a19e04c38908f02a1f9ca22.exe
-
Size
1.6MB
-
MD5
5b89932d8f9f7806c66141203042ea1b
-
SHA1
dd38e9b111a3581217c8aa9ccc80d4d838a20ea7
-
SHA256
99ecaff6fefedf3b7b7d6d0dba4d15c55ca1a7d57a19e04c38908f02a1f9ca22
-
SHA512
69b5d0191a294fba020d4e354b37c13d4d39c65904013be636c7b9b02bec29a7f7027446d5f513db32a31c75f01955ba97e01927660d936e6878101a732797bc
Malware Config
Extracted
buer
http://kload01.info/
http://kload02.info/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\UBlockPlugin\\plugin.exe\"" plugin.exe -
resource yara_rule behavioral2/memory/3196-130-0x000000003FA80000-0x000000003FEBB000-memory.dmp buer behavioral2/memory/3196-132-0x000000003FA80000-0x000000003FEBB000-memory.dmp buer behavioral2/memory/3196-133-0x000000003FA80000-0x000000003FEBB000-memory.dmp buer behavioral2/memory/3196-134-0x000000003FA80000-0x000000003FEBB000-memory.dmp buer behavioral2/memory/3196-139-0x000000003FA80000-0x000000003FEBB000-memory.dmp buer behavioral2/memory/4224-142-0x000000003F410000-0x000000003F84B000-memory.dmp buer behavioral2/memory/4224-143-0x000000003F410000-0x000000003F84B000-memory.dmp buer behavioral2/memory/4224-144-0x000000003F410000-0x000000003F84B000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ plugin.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 99ecaff6fefedf3b7b7d6d0dba4d15c55ca1a7d57a19e04c38908f02a1f9ca22.exe -
Executes dropped EXE 1 IoCs
pid Process 4224 plugin.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 99ecaff6fefedf3b7b7d6d0dba4d15c55ca1a7d57a19e04c38908f02a1f9ca22.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 99ecaff6fefedf3b7b7d6d0dba4d15c55ca1a7d57a19e04c38908f02a1f9ca22.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion plugin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion plugin.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Wine 99ecaff6fefedf3b7b7d6d0dba4d15c55ca1a7d57a19e04c38908f02a1f9ca22.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Wine plugin.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3196 99ecaff6fefedf3b7b7d6d0dba4d15c55ca1a7d57a19e04c38908f02a1f9ca22.exe 4224 plugin.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4000 1344 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3196 99ecaff6fefedf3b7b7d6d0dba4d15c55ca1a7d57a19e04c38908f02a1f9ca22.exe 3196 99ecaff6fefedf3b7b7d6d0dba4d15c55ca1a7d57a19e04c38908f02a1f9ca22.exe 4224 plugin.exe 4224 plugin.exe 4224 plugin.exe 4224 plugin.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3196 wrote to memory of 4224 3196 99ecaff6fefedf3b7b7d6d0dba4d15c55ca1a7d57a19e04c38908f02a1f9ca22.exe 82 PID 3196 wrote to memory of 4224 3196 99ecaff6fefedf3b7b7d6d0dba4d15c55ca1a7d57a19e04c38908f02a1f9ca22.exe 82 PID 3196 wrote to memory of 4224 3196 99ecaff6fefedf3b7b7d6d0dba4d15c55ca1a7d57a19e04c38908f02a1f9ca22.exe 82 PID 4224 wrote to memory of 1344 4224 plugin.exe 83 PID 4224 wrote to memory of 1344 4224 plugin.exe 83 PID 4224 wrote to memory of 1344 4224 plugin.exe 83 PID 4224 wrote to memory of 1344 4224 plugin.exe 83 PID 4224 wrote to memory of 1344 4224 plugin.exe 83 PID 4224 wrote to memory of 1344 4224 plugin.exe 83 PID 4224 wrote to memory of 1344 4224 plugin.exe 83 PID 4224 wrote to memory of 1344 4224 plugin.exe 83 PID 4224 wrote to memory of 1344 4224 plugin.exe 83 PID 4224 wrote to memory of 1344 4224 plugin.exe 83 PID 4224 wrote to memory of 1344 4224 plugin.exe 83 PID 4224 wrote to memory of 1344 4224 plugin.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\99ecaff6fefedf3b7b7d6d0dba4d15c55ca1a7d57a19e04c38908f02a1f9ca22.exe"C:\Users\Admin\AppData\Local\Temp\99ecaff6fefedf3b7b7d6d0dba4d15c55ca1a7d57a19e04c38908f02a1f9ca22.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\ProgramData\UBlockPlugin\plugin.exeC:\ProgramData\UBlockPlugin\plugin.exe "C:\Users\Admin\AppData\Local\Temp\99ecaff6fefedf3b7b7d6d0dba4d15c55ca1a7d57a19e04c38908f02a1f9ca22.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\UBlockPlugin\plugin.exe3⤵PID:1344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 2204⤵
- Program crash
PID:4000
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1344 -ip 13441⤵PID:1200
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD55b89932d8f9f7806c66141203042ea1b
SHA1dd38e9b111a3581217c8aa9ccc80d4d838a20ea7
SHA25699ecaff6fefedf3b7b7d6d0dba4d15c55ca1a7d57a19e04c38908f02a1f9ca22
SHA51269b5d0191a294fba020d4e354b37c13d4d39c65904013be636c7b9b02bec29a7f7027446d5f513db32a31c75f01955ba97e01927660d936e6878101a732797bc
-
Filesize
1.6MB
MD55b89932d8f9f7806c66141203042ea1b
SHA1dd38e9b111a3581217c8aa9ccc80d4d838a20ea7
SHA25699ecaff6fefedf3b7b7d6d0dba4d15c55ca1a7d57a19e04c38908f02a1f9ca22
SHA51269b5d0191a294fba020d4e354b37c13d4d39c65904013be636c7b9b02bec29a7f7027446d5f513db32a31c75f01955ba97e01927660d936e6878101a732797bc