Analysis
-
max time kernel
153s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-06-2022 11:19
Static task
static1
Behavioral task
behavioral1
Sample
3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exe
Resource
win10v2004-20220414-en
General
-
Target
3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exe
-
Size
1.8MB
-
MD5
28623b3264e04f4b160425d0c10f4a54
-
SHA1
d8d8b1f79204ec37e62a8cda2778808c91de8d98
-
SHA256
3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203
-
SHA512
0047420a38ab935eae6781e1e07d6f558841cb940cd1b337d30da20b9b1b620ef54218d564d2eb23de6d6b37b5ba4db8d63cacf5b52916cf96867da9da8a3d82
Malware Config
Extracted
buer
http://loy01.top/
http://loy02.top/
cook5**gjt+,)ojk*
cook5**gjt+-)ojk*
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
plugin.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\UBlockPlugin\\plugin.exe\"" plugin.exe -
Processes:
resource yara_rule behavioral2/memory/2852-135-0x000000003F9F0000-0x000000003FE77000-memory.dmp buer behavioral2/memory/3184-138-0x000000003FBD0000-0x0000000040057000-memory.dmp buer behavioral2/memory/3184-141-0x000000003FBD0000-0x0000000040057000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
Processes:
3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exeplugin.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ plugin.exe -
Executes dropped EXE 1 IoCs
Processes:
plugin.exepid Process 3184 plugin.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
plugin.exe3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion plugin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion plugin.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exeplugin.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Wine 3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Wine plugin.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exeplugin.exepid Process 2852 3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exe 3184 plugin.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 4184 4840 WerFault.exe 82 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exeplugin.exepid Process 2852 3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exe 2852 3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exe 3184 plugin.exe 3184 plugin.exe 3184 plugin.exe 3184 plugin.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exeplugin.exedescription pid Process procid_target PID 2852 wrote to memory of 3184 2852 3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exe 81 PID 2852 wrote to memory of 3184 2852 3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exe 81 PID 2852 wrote to memory of 3184 2852 3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exe 81 PID 3184 wrote to memory of 4840 3184 plugin.exe 82 PID 3184 wrote to memory of 4840 3184 plugin.exe 82 PID 3184 wrote to memory of 4840 3184 plugin.exe 82 PID 3184 wrote to memory of 4840 3184 plugin.exe 82 PID 3184 wrote to memory of 4840 3184 plugin.exe 82 PID 3184 wrote to memory of 4840 3184 plugin.exe 82 PID 3184 wrote to memory of 4840 3184 plugin.exe 82 PID 3184 wrote to memory of 4840 3184 plugin.exe 82 PID 3184 wrote to memory of 4840 3184 plugin.exe 82 PID 3184 wrote to memory of 4840 3184 plugin.exe 82 PID 3184 wrote to memory of 4840 3184 plugin.exe 82 PID 3184 wrote to memory of 4840 3184 plugin.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exe"C:\Users\Admin\AppData\Local\Temp\3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\ProgramData\UBlockPlugin\plugin.exeC:\ProgramData\UBlockPlugin\plugin.exe "C:\Users\Admin\AppData\Local\Temp\3c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\UBlockPlugin\plugin.exe3⤵PID:4840
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 2244⤵
- Program crash
PID:4184
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4840 -ip 48401⤵PID:544
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD528623b3264e04f4b160425d0c10f4a54
SHA1d8d8b1f79204ec37e62a8cda2778808c91de8d98
SHA2563c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203
SHA5120047420a38ab935eae6781e1e07d6f558841cb940cd1b337d30da20b9b1b620ef54218d564d2eb23de6d6b37b5ba4db8d63cacf5b52916cf96867da9da8a3d82
-
Filesize
1.8MB
MD528623b3264e04f4b160425d0c10f4a54
SHA1d8d8b1f79204ec37e62a8cda2778808c91de8d98
SHA2563c1a487926e726fda53c8d5e2a6f455fb6a7a5de3758925d9250c95c17b19203
SHA5120047420a38ab935eae6781e1e07d6f558841cb940cd1b337d30da20b9b1b620ef54218d564d2eb23de6d6b37b5ba4db8d63cacf5b52916cf96867da9da8a3d82