Analysis
-
max time kernel
146s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
01-07-2022 03:05
Static task
static1
Behavioral task
behavioral1
Sample
825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4.exe
Resource
win10v2004-20220414-en
General
-
Target
825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4.exe
-
Size
1.7MB
-
MD5
ef942beae72f6d7b660b572327c83e63
-
SHA1
8a3dbc49f067767eba14991d34eba775bae7c74c
-
SHA256
825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4
-
SHA512
97714e8a60fd09deb535a22a8c3cba190c2a089cb293a22be89117b5c9403266565627d3b8d9055f58019560d6de1db8e1fd615591b40d8eaa042f52f9f849b4
Malware Config
Extracted
buer
http://lodddd01.info/
http://lodddd02.info/
cook5**gj____+,)diaj*
cook5**gj____+-)diaj*
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\UBlockPlugin\\plugin.exe\"" plugin.exe -
resource yara_rule behavioral2/memory/3484-130-0x000000003FAA0000-0x000000003FEEE000-memory.dmp buer behavioral2/memory/3484-132-0x000000003FAA0000-0x000000003FEEE000-memory.dmp buer behavioral2/memory/3484-134-0x000000003FAA0000-0x000000003FEEE000-memory.dmp buer behavioral2/memory/3484-135-0x000000003FAA0000-0x000000003FEEE000-memory.dmp buer behavioral2/memory/3484-139-0x000000003FAA0000-0x000000003FEEE000-memory.dmp buer behavioral2/memory/4684-143-0x000000003F3E0000-0x000000003F82E000-memory.dmp buer behavioral2/memory/4684-145-0x000000003F3E0000-0x000000003F82E000-memory.dmp buer behavioral2/memory/4684-147-0x000000003F3E0000-0x000000003F82E000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ plugin.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4.exe -
Executes dropped EXE 1 IoCs
pid Process 4684 plugin.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion plugin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion plugin.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Wine 825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Wine plugin.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3484 825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4.exe 4684 plugin.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2612 4476 WerFault.exe 80 3700 4684 WerFault.exe 79 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3484 825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4.exe 3484 825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4.exe 4684 plugin.exe 4684 plugin.exe 4684 plugin.exe 4684 plugin.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3484 wrote to memory of 4684 3484 825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4.exe 79 PID 3484 wrote to memory of 4684 3484 825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4.exe 79 PID 3484 wrote to memory of 4684 3484 825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4.exe 79 PID 4684 wrote to memory of 4476 4684 plugin.exe 80 PID 4684 wrote to memory of 4476 4684 plugin.exe 80 PID 4684 wrote to memory of 4476 4684 plugin.exe 80 PID 4684 wrote to memory of 4476 4684 plugin.exe 80 PID 4684 wrote to memory of 4476 4684 plugin.exe 80 PID 4684 wrote to memory of 4476 4684 plugin.exe 80 PID 4684 wrote to memory of 4476 4684 plugin.exe 80 PID 4684 wrote to memory of 4476 4684 plugin.exe 80 PID 4684 wrote to memory of 4476 4684 plugin.exe 80 PID 4684 wrote to memory of 4476 4684 plugin.exe 80 PID 4684 wrote to memory of 4476 4684 plugin.exe 80 PID 4684 wrote to memory of 4476 4684 plugin.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4.exe"C:\Users\Admin\AppData\Local\Temp\825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\ProgramData\UBlockPlugin\plugin.exeC:\ProgramData\UBlockPlugin\plugin.exe "C:\Users\Admin\AppData\Local\Temp\825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\UBlockPlugin\plugin.exe3⤵PID:4476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4476 -s 2204⤵
- Program crash
PID:2612
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 7723⤵
- Program crash
PID:3700
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4476 -ip 44761⤵PID:824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4684 -ip 46841⤵PID:4968
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5ef942beae72f6d7b660b572327c83e63
SHA18a3dbc49f067767eba14991d34eba775bae7c74c
SHA256825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4
SHA51297714e8a60fd09deb535a22a8c3cba190c2a089cb293a22be89117b5c9403266565627d3b8d9055f58019560d6de1db8e1fd615591b40d8eaa042f52f9f849b4
-
Filesize
1.7MB
MD5ef942beae72f6d7b660b572327c83e63
SHA18a3dbc49f067767eba14991d34eba775bae7c74c
SHA256825933063c5be4e41f1931b4c818057cd18a42ab0034225740bfed72a9ed4ef4
SHA51297714e8a60fd09deb535a22a8c3cba190c2a089cb293a22be89117b5c9403266565627d3b8d9055f58019560d6de1db8e1fd615591b40d8eaa042f52f9f849b4