Analysis
-
max time kernel
91s -
max time network
93s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
01-07-2022 03:06
Static task
static1
Behavioral task
behavioral1
Sample
934e5538341e13807b5a173776e947596814f9dd2fd179e8373d70f2b6170b24.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
934e5538341e13807b5a173776e947596814f9dd2fd179e8373d70f2b6170b24.exe
Resource
win10v2004-20220414-en
General
-
Target
934e5538341e13807b5a173776e947596814f9dd2fd179e8373d70f2b6170b24.exe
-
Size
239KB
-
MD5
d9c64a5e7e3dd6aece2ae1dadba56b8f
-
SHA1
e898639ea0f46754acd5d9102145e09602341ba7
-
SHA256
934e5538341e13807b5a173776e947596814f9dd2fd179e8373d70f2b6170b24
-
SHA512
317bbcbca132cfe33c84628af0765139c3b0c93c6f2f9b7e3047c378b64727eb40087e3a869e9014591cb126d7cf7a7e53e1ae183deab26755dfffdfbc87c097
Malware Config
Extracted
buer
http://appnoder11113.info/
http://45.138.157.17/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\UBlockPlugin\\plugin.exe\"" plugin.exe -
resource yara_rule behavioral1/memory/1684-60-0x0000000000020000-0x0000000000029000-memory.dmp buer behavioral1/memory/1684-61-0x0000000040000000-0x00000000432E4000-memory.dmp buer behavioral1/memory/1480-69-0x0000000040000000-0x00000000432E4000-memory.dmp buer behavioral1/memory/1480-86-0x0000000040000000-0x00000000432E4000-memory.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 1480 plugin.exe -
Deletes itself 1 IoCs
pid Process 1480 plugin.exe -
Loads dropped DLL 2 IoCs
pid Process 1684 934e5538341e13807b5a173776e947596814f9dd2fd179e8373d70f2b6170b24.exe 1684 934e5538341e13807b5a173776e947596814f9dd2fd179e8373d70f2b6170b24.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1480 plugin.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1684 wrote to memory of 1480 1684 934e5538341e13807b5a173776e947596814f9dd2fd179e8373d70f2b6170b24.exe 28 PID 1684 wrote to memory of 1480 1684 934e5538341e13807b5a173776e947596814f9dd2fd179e8373d70f2b6170b24.exe 28 PID 1684 wrote to memory of 1480 1684 934e5538341e13807b5a173776e947596814f9dd2fd179e8373d70f2b6170b24.exe 28 PID 1684 wrote to memory of 1480 1684 934e5538341e13807b5a173776e947596814f9dd2fd179e8373d70f2b6170b24.exe 28 PID 1480 wrote to memory of 2032 1480 plugin.exe 29 PID 1480 wrote to memory of 2032 1480 plugin.exe 29 PID 1480 wrote to memory of 2032 1480 plugin.exe 29 PID 1480 wrote to memory of 2032 1480 plugin.exe 29 PID 1480 wrote to memory of 2032 1480 plugin.exe 29 PID 1480 wrote to memory of 2032 1480 plugin.exe 29 PID 1480 wrote to memory of 2032 1480 plugin.exe 29 PID 1480 wrote to memory of 2032 1480 plugin.exe 29 PID 1480 wrote to memory of 2032 1480 plugin.exe 29 PID 1480 wrote to memory of 2032 1480 plugin.exe 29 PID 1480 wrote to memory of 2032 1480 plugin.exe 29 PID 1480 wrote to memory of 2032 1480 plugin.exe 29 PID 1480 wrote to memory of 2032 1480 plugin.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\934e5538341e13807b5a173776e947596814f9dd2fd179e8373d70f2b6170b24.exe"C:\Users\Admin\AppData\Local\Temp\934e5538341e13807b5a173776e947596814f9dd2fd179e8373d70f2b6170b24.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\ProgramData\UBlockPlugin\plugin.exeC:\ProgramData\UBlockPlugin\plugin.exe "C:\Users\Admin\AppData\Local\Temp\934e5538341e13807b5a173776e947596814f9dd2fd179e8373d70f2b6170b24.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\UBlockPlugin\plugin.exe3⤵PID:2032
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239KB
MD5d9c64a5e7e3dd6aece2ae1dadba56b8f
SHA1e898639ea0f46754acd5d9102145e09602341ba7
SHA256934e5538341e13807b5a173776e947596814f9dd2fd179e8373d70f2b6170b24
SHA512317bbcbca132cfe33c84628af0765139c3b0c93c6f2f9b7e3047c378b64727eb40087e3a869e9014591cb126d7cf7a7e53e1ae183deab26755dfffdfbc87c097
-
Filesize
239KB
MD5d9c64a5e7e3dd6aece2ae1dadba56b8f
SHA1e898639ea0f46754acd5d9102145e09602341ba7
SHA256934e5538341e13807b5a173776e947596814f9dd2fd179e8373d70f2b6170b24
SHA512317bbcbca132cfe33c84628af0765139c3b0c93c6f2f9b7e3047c378b64727eb40087e3a869e9014591cb126d7cf7a7e53e1ae183deab26755dfffdfbc87c097
-
Filesize
239KB
MD5d9c64a5e7e3dd6aece2ae1dadba56b8f
SHA1e898639ea0f46754acd5d9102145e09602341ba7
SHA256934e5538341e13807b5a173776e947596814f9dd2fd179e8373d70f2b6170b24
SHA512317bbcbca132cfe33c84628af0765139c3b0c93c6f2f9b7e3047c378b64727eb40087e3a869e9014591cb126d7cf7a7e53e1ae183deab26755dfffdfbc87c097
-
Filesize
239KB
MD5d9c64a5e7e3dd6aece2ae1dadba56b8f
SHA1e898639ea0f46754acd5d9102145e09602341ba7
SHA256934e5538341e13807b5a173776e947596814f9dd2fd179e8373d70f2b6170b24
SHA512317bbcbca132cfe33c84628af0765139c3b0c93c6f2f9b7e3047c378b64727eb40087e3a869e9014591cb126d7cf7a7e53e1ae183deab26755dfffdfbc87c097