Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 11:19
Static task
static1
Behavioral task
behavioral1
Sample
3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exe
Resource
win10v2004-20220414-en
General
-
Target
3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exe
-
Size
1.8MB
-
MD5
28623b3264e04f4b160425d0c10f4a54
-
SHA1
d8d8b1f79204ec37e62a8cda2778808c91de8d98
-
SHA256
3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203
-
SHA512
0047420a38ab935eae6781e1e07d6f558841cb940cd1b337d30da20b9b1b620ef54218d564d2eb23de6d6b37b5ba4db8d63cacf5b52916cf96867da9da8a3d82
Malware Config
Extracted
buer
http://loy01.top/
http://loy02.top/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
plugin.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\UBlockPlugin\\plugin.exe\"" plugin.exe -
Processes:
resource yara_rule behavioral1/memory/1784-58-0x000000003F5E0000-0x000000003FA67000-memory.dmp buer behavioral1/memory/1988-69-0x000000003FA80000-0x000000003FF07000-memory.dmp buer behavioral1/memory/1988-72-0x000000003FA80000-0x000000003FF07000-memory.dmp buer behavioral1/memory/1988-81-0x000000003FA80000-0x000000003FF07000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exeplugin.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ plugin.exe -
Executes dropped EXE 1 IoCs
Processes:
plugin.exepid Process 1988 plugin.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exeplugin.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion plugin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion plugin.exe -
Deletes itself 1 IoCs
Processes:
plugin.exepid Process 1988 plugin.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exeplugin.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Wine 3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exe Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Wine plugin.exe -
Loads dropped DLL 2 IoCs
Processes:
3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exepid Process 1784 3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exe 1784 3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exeplugin.exepid Process 1784 3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exe 1988 plugin.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 1276 980 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exeplugin.exepid Process 1784 3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exe 1988 plugin.exe 1988 plugin.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exeplugin.exesecinit.exedescription pid Process procid_target PID 1784 wrote to memory of 1988 1784 3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exe 27 PID 1784 wrote to memory of 1988 1784 3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exe 27 PID 1784 wrote to memory of 1988 1784 3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exe 27 PID 1784 wrote to memory of 1988 1784 3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exe 27 PID 1988 wrote to memory of 980 1988 plugin.exe 28 PID 1988 wrote to memory of 980 1988 plugin.exe 28 PID 1988 wrote to memory of 980 1988 plugin.exe 28 PID 1988 wrote to memory of 980 1988 plugin.exe 28 PID 1988 wrote to memory of 980 1988 plugin.exe 28 PID 1988 wrote to memory of 980 1988 plugin.exe 28 PID 1988 wrote to memory of 980 1988 plugin.exe 28 PID 1988 wrote to memory of 980 1988 plugin.exe 28 PID 1988 wrote to memory of 980 1988 plugin.exe 28 PID 1988 wrote to memory of 980 1988 plugin.exe 28 PID 1988 wrote to memory of 980 1988 plugin.exe 28 PID 1988 wrote to memory of 980 1988 plugin.exe 28 PID 1988 wrote to memory of 980 1988 plugin.exe 28 PID 980 wrote to memory of 1276 980 secinit.exe 29 PID 980 wrote to memory of 1276 980 secinit.exe 29 PID 980 wrote to memory of 1276 980 secinit.exe 29 PID 980 wrote to memory of 1276 980 secinit.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exe"C:\Users\Admin\AppData\Local\Temp\3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\ProgramData\UBlockPlugin\plugin.exeC:\ProgramData\UBlockPlugin\plugin.exe "C:\Users\Admin\AppData\Local\Temp\3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Deletes itself
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\UBlockPlugin\plugin.exe3⤵
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 980 -s 1364⤵
- Program crash
PID:1276
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD528623b3264e04f4b160425d0c10f4a54
SHA1d8d8b1f79204ec37e62a8cda2778808c91de8d98
SHA2563c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203
SHA5120047420a38ab935eae6781e1e07d6f558841cb940cd1b337d30da20b9b1b620ef54218d564d2eb23de6d6b37b5ba4db8d63cacf5b52916cf96867da9da8a3d82
-
Filesize
1.8MB
MD528623b3264e04f4b160425d0c10f4a54
SHA1d8d8b1f79204ec37e62a8cda2778808c91de8d98
SHA2563c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203
SHA5120047420a38ab935eae6781e1e07d6f558841cb940cd1b337d30da20b9b1b620ef54218d564d2eb23de6d6b37b5ba4db8d63cacf5b52916cf96867da9da8a3d82
-
Filesize
1.8MB
MD528623b3264e04f4b160425d0c10f4a54
SHA1d8d8b1f79204ec37e62a8cda2778808c91de8d98
SHA2563c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203
SHA5120047420a38ab935eae6781e1e07d6f558841cb940cd1b337d30da20b9b1b620ef54218d564d2eb23de6d6b37b5ba4db8d63cacf5b52916cf96867da9da8a3d82
-
Filesize
1.8MB
MD528623b3264e04f4b160425d0c10f4a54
SHA1d8d8b1f79204ec37e62a8cda2778808c91de8d98
SHA2563c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203
SHA5120047420a38ab935eae6781e1e07d6f558841cb940cd1b337d30da20b9b1b620ef54218d564d2eb23de6d6b37b5ba4db8d63cacf5b52916cf96867da9da8a3d82