Analysis
-
max time kernel
46s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
01-07-2022 03:05
Static task
static1
Behavioral task
behavioral1
Sample
825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4.exe
Resource
win10v2004-20220414-en
General
-
Target
825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4.exe
-
Size
1.7MB
-
MD5
ef942beae72f6d7b660b572327c83e63
-
SHA1
8a3dbc49f067767eba14991d34eba775bae7c74c
-
SHA256
825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4
-
SHA512
97714e8a60fd09deb535a22a8c3cba190c2a089cb293a22be89117b5c9403266565627d3b8d9055f58019560d6de1db8e1fd615591b40d8eaa042f52f9f849b4
Malware Config
Extracted
buer
http://lodddd01.info/
http://lodddd02.info/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\UBlockPlugin\\plugin.exe\"" plugin.exe -
resource yara_rule behavioral1/memory/732-55-0x000000003F6C0000-0x000000003FB0E000-memory.dmp buer behavioral1/memory/732-61-0x000000003F6C0000-0x000000003FB0E000-memory.dmp buer behavioral1/memory/2000-81-0x000000003FCA0000-0x00000000400EE000-memory.dmp buer behavioral1/memory/2000-82-0x000000003FCA0000-0x00000000400EE000-memory.dmp buer behavioral1/memory/2000-83-0x000000003FCA0000-0x00000000400EE000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ plugin.exe -
Executes dropped EXE 1 IoCs
pid Process 2000 plugin.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion plugin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion plugin.exe -
Deletes itself 1 IoCs
pid Process 2000 plugin.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Wine 825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Wine plugin.exe -
Loads dropped DLL 2 IoCs
pid Process 732 825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4.exe 732 825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 732 825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4.exe 2000 plugin.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1736 1420 WerFault.exe 29 556 2000 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 732 825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4.exe 2000 plugin.exe 2000 plugin.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 732 wrote to memory of 2000 732 825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4.exe 28 PID 732 wrote to memory of 2000 732 825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4.exe 28 PID 732 wrote to memory of 2000 732 825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4.exe 28 PID 732 wrote to memory of 2000 732 825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4.exe 28 PID 2000 wrote to memory of 1420 2000 plugin.exe 29 PID 2000 wrote to memory of 1420 2000 plugin.exe 29 PID 2000 wrote to memory of 1420 2000 plugin.exe 29 PID 2000 wrote to memory of 1420 2000 plugin.exe 29 PID 2000 wrote to memory of 1420 2000 plugin.exe 29 PID 2000 wrote to memory of 1420 2000 plugin.exe 29 PID 2000 wrote to memory of 1420 2000 plugin.exe 29 PID 2000 wrote to memory of 1420 2000 plugin.exe 29 PID 2000 wrote to memory of 1420 2000 plugin.exe 29 PID 2000 wrote to memory of 1420 2000 plugin.exe 29 PID 2000 wrote to memory of 1420 2000 plugin.exe 29 PID 2000 wrote to memory of 1420 2000 plugin.exe 29 PID 2000 wrote to memory of 1420 2000 plugin.exe 29 PID 1420 wrote to memory of 1736 1420 secinit.exe 30 PID 1420 wrote to memory of 1736 1420 secinit.exe 30 PID 1420 wrote to memory of 1736 1420 secinit.exe 30 PID 1420 wrote to memory of 1736 1420 secinit.exe 30 PID 2000 wrote to memory of 556 2000 plugin.exe 31 PID 2000 wrote to memory of 556 2000 plugin.exe 31 PID 2000 wrote to memory of 556 2000 plugin.exe 31 PID 2000 wrote to memory of 556 2000 plugin.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4.exe"C:\Users\Admin\AppData\Local\Temp\825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:732 -
C:\ProgramData\UBlockPlugin\plugin.exeC:\ProgramData\UBlockPlugin\plugin.exe "C:\Users\Admin\AppData\Local\Temp\825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Deletes itself
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\UBlockPlugin\plugin.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1420 -s 1364⤵
- Program crash
PID:1736
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 5643⤵
- Program crash
PID:556
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5ef942beae72f6d7b660b572327c83e63
SHA18a3dbc49f067767eba14991d34eba775bae7c74c
SHA256825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4
SHA51297714e8a60fd09deb535a22a8c3cba190c2a089cb293a22be89117b5c9403266565627d3b8d9055f58019560d6de1db8e1fd615591b40d8eaa042f52f9f849b4
-
Filesize
1.7MB
MD5ef942beae72f6d7b660b572327c83e63
SHA18a3dbc49f067767eba14991d34eba775bae7c74c
SHA256825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4
SHA51297714e8a60fd09deb535a22a8c3cba190c2a089cb293a22be89117b5c9403266565627d3b8d9055f58019560d6de1db8e1fd615591b40d8eaa042f52f9f849b4
-
Filesize
1.7MB
MD5ef942beae72f6d7b660b572327c83e63
SHA18a3dbc49f067767eba14991d34eba775bae7c74c
SHA256825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4
SHA51297714e8a60fd09deb535a22a8c3cba190c2a089cb293a22be89117b5c9403266565627d3b8d9055f58019560d6de1db8e1fd615591b40d8eaa042f52f9f849b4
-
Filesize
1.7MB
MD5ef942beae72f6d7b660b572327c83e63
SHA18a3dbc49f067767eba14991d34eba775bae7c74c
SHA256825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4
SHA51297714e8a60fd09deb535a22a8c3cba190c2a089cb293a22be89117b5c9403266565627d3b8d9055f58019560d6de1db8e1fd615591b40d8eaa042f52f9f849b4