Analysis
-
max time kernel
161s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-06-2022 11:17
Static task
static1
Behavioral task
behavioral1
Sample
95273409959433f7b80f387eec09692291e7795c30ed659c1b1228a5ad72a5cc.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
95273409959433f7b80f387eec09692291e7795c30ed659c1b1228a5ad72a5cc.exe
Resource
win10v2004-20220414-en
General
-
Target
95273409959433f7b80f387eec09692291e7795c30ed659c1b1228a5ad72a5cc.exe
-
Size
1.6MB
-
MD5
d84fc8f135bbf515b8f99412b58fe5b1
-
SHA1
5707a9ab80925f288f0fcbf0b211d0f2801c595e
-
SHA256
95273409959433f7b80f387eec09692291e7795c30ed659c1b1228a5ad72a5cc
-
SHA512
8f2173c34e7db6700e8c4c4683789a5658a9d27ca3bb921872454d75b6c360f89b5b593d4d258d97fd1b7fc00c99587ebf67235b32e30a58010d1ca7b70d92c6
Malware Config
Extracted
buer
http://kload01.info/
http://kload02.info/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\UBlockPlugin\\plugin.exe\"" plugin.exe -
resource yara_rule behavioral2/memory/4776-132-0x000000003FF70000-0x00000000403A9000-memory.dmp buer behavioral2/memory/4776-133-0x000000003FF70000-0x00000000403A9000-memory.dmp buer behavioral2/memory/4776-134-0x000000003FF70000-0x00000000403A9000-memory.dmp buer behavioral2/memory/4776-138-0x000000003FF70000-0x00000000403A9000-memory.dmp buer behavioral2/memory/4548-142-0x000000003F700000-0x000000003FB39000-memory.dmp buer behavioral2/memory/4548-143-0x000000003F700000-0x000000003FB39000-memory.dmp buer behavioral2/memory/4548-144-0x000000003F700000-0x000000003FB39000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 95273409959433f7b80f387eec09692291e7795c30ed659c1b1228a5ad72a5cc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ plugin.exe -
Executes dropped EXE 1 IoCs
pid Process 4548 plugin.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion plugin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 95273409959433f7b80f387eec09692291e7795c30ed659c1b1228a5ad72a5cc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 95273409959433f7b80f387eec09692291e7795c30ed659c1b1228a5ad72a5cc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion plugin.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Wine 95273409959433f7b80f387eec09692291e7795c30ed659c1b1228a5ad72a5cc.exe Key opened \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Wine plugin.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4776 95273409959433f7b80f387eec09692291e7795c30ed659c1b1228a5ad72a5cc.exe 4548 plugin.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4612 988 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4776 95273409959433f7b80f387eec09692291e7795c30ed659c1b1228a5ad72a5cc.exe 4776 95273409959433f7b80f387eec09692291e7795c30ed659c1b1228a5ad72a5cc.exe 4548 plugin.exe 4548 plugin.exe 4548 plugin.exe 4548 plugin.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4776 wrote to memory of 4548 4776 95273409959433f7b80f387eec09692291e7795c30ed659c1b1228a5ad72a5cc.exe 82 PID 4776 wrote to memory of 4548 4776 95273409959433f7b80f387eec09692291e7795c30ed659c1b1228a5ad72a5cc.exe 82 PID 4776 wrote to memory of 4548 4776 95273409959433f7b80f387eec09692291e7795c30ed659c1b1228a5ad72a5cc.exe 82 PID 4548 wrote to memory of 988 4548 plugin.exe 84 PID 4548 wrote to memory of 988 4548 plugin.exe 84 PID 4548 wrote to memory of 988 4548 plugin.exe 84 PID 4548 wrote to memory of 988 4548 plugin.exe 84 PID 4548 wrote to memory of 988 4548 plugin.exe 84 PID 4548 wrote to memory of 988 4548 plugin.exe 84 PID 4548 wrote to memory of 988 4548 plugin.exe 84 PID 4548 wrote to memory of 988 4548 plugin.exe 84 PID 4548 wrote to memory of 988 4548 plugin.exe 84 PID 4548 wrote to memory of 988 4548 plugin.exe 84 PID 4548 wrote to memory of 988 4548 plugin.exe 84 PID 4548 wrote to memory of 988 4548 plugin.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\95273409959433f7b80f387eec09692291e7795c30ed659c1b1228a5ad72a5cc.exe"C:\Users\Admin\AppData\Local\Temp\95273409959433f7b80f387eec09692291e7795c30ed659c1b1228a5ad72a5cc.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\ProgramData\UBlockPlugin\plugin.exeC:\ProgramData\UBlockPlugin\plugin.exe "C:\Users\Admin\AppData\Local\Temp\95273409959433f7b80f387eec09692291e7795c30ed659c1b1228a5ad72a5cc.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\UBlockPlugin\plugin.exe3⤵PID:988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 988 -s 2324⤵
- Program crash
PID:4612
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 988 -ip 9881⤵PID:4896
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5d84fc8f135bbf515b8f99412b58fe5b1
SHA15707a9ab80925f288f0fcbf0b211d0f2801c595e
SHA25695273409959433f7b80f387eec09692291e7795c30ed659c1b1228a5ad72a5cc
SHA5128f2173c34e7db6700e8c4c4683789a5658a9d27ca3bb921872454d75b6c360f89b5b593d4d258d97fd1b7fc00c99587ebf67235b32e30a58010d1ca7b70d92c6
-
Filesize
1.6MB
MD5d84fc8f135bbf515b8f99412b58fe5b1
SHA15707a9ab80925f288f0fcbf0b211d0f2801c595e
SHA25695273409959433f7b80f387eec09692291e7795c30ed659c1b1228a5ad72a5cc
SHA5128f2173c34e7db6700e8c4c4683789a5658a9d27ca3bb921872454d75b6c360f89b5b593d4d258d97fd1b7fc00c99587ebf67235b32e30a58010d1ca7b70d92c6