Analysis
-
max time kernel
158s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
01-07-2022 03:06
Static task
static1
Behavioral task
behavioral1
Sample
934e5538341e13807b5a173776e947596814f9dd2fd179e8373d70f2b6170b24.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
934e5538341e13807b5a173776e947596814f9dd2fd179e8373d70f2b6170b24.exe
Resource
win10v2004-20220414-en
General
-
Target
934e5538341e13807b5a173776e947596814f9dd2fd179e8373d70f2b6170b24.exe
-
Size
239KB
-
MD5
d9c64a5e7e3dd6aece2ae1dadba56b8f
-
SHA1
e898639ea0f46754acd5d9102145e09602341ba7
-
SHA256
934e5538341e13807b5a173776e947596814f9dd2fd179e8373d70f2b6170b24
-
SHA512
317bbcbca132cfe33c84628af0765139c3b0c93c6f2f9b7e3047c378b64727eb40087e3a869e9014591cb126d7cf7a7e53e1ae183deab26755dfffdfbc87c097
Malware Config
Extracted
buer
http://appnoder11113.info/
http://45.138.157.17/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\UBlockPlugin\\plugin.exe\"" plugin.exe -
resource yara_rule behavioral2/memory/4124-134-0x0000000000030000-0x0000000000039000-memory.dmp buer behavioral2/memory/4124-135-0x0000000040000000-0x00000000432E4000-memory.dmp buer behavioral2/memory/4260-138-0x0000000040000000-0x00000000432E4000-memory.dmp buer behavioral2/memory/4260-143-0x0000000040000000-0x00000000432E4000-memory.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 4260 plugin.exe -
Program crash 8 IoCs
pid pid_target Process procid_target 2096 4260 WerFault.exe 77 2348 4260 WerFault.exe 77 1500 4260 WerFault.exe 77 4344 4260 WerFault.exe 77 852 4260 WerFault.exe 77 3700 3912 WerFault.exe 78 3524 3912 WerFault.exe 78 2448 4260 WerFault.exe 77 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4260 plugin.exe 4260 plugin.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4124 wrote to memory of 4260 4124 934e5538341e13807b5a173776e947596814f9dd2fd179e8373d70f2b6170b24.exe 77 PID 4124 wrote to memory of 4260 4124 934e5538341e13807b5a173776e947596814f9dd2fd179e8373d70f2b6170b24.exe 77 PID 4124 wrote to memory of 4260 4124 934e5538341e13807b5a173776e947596814f9dd2fd179e8373d70f2b6170b24.exe 77 PID 4260 wrote to memory of 3912 4260 plugin.exe 78 PID 4260 wrote to memory of 3912 4260 plugin.exe 78 PID 4260 wrote to memory of 3912 4260 plugin.exe 78 PID 4260 wrote to memory of 3912 4260 plugin.exe 78 PID 4260 wrote to memory of 3912 4260 plugin.exe 78 PID 4260 wrote to memory of 3912 4260 plugin.exe 78 PID 4260 wrote to memory of 3912 4260 plugin.exe 78 PID 4260 wrote to memory of 3912 4260 plugin.exe 78 PID 4260 wrote to memory of 3912 4260 plugin.exe 78 PID 4260 wrote to memory of 3912 4260 plugin.exe 78 PID 4260 wrote to memory of 3912 4260 plugin.exe 78 PID 4260 wrote to memory of 3912 4260 plugin.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\934e5538341e13807b5a173776e947596814f9dd2fd179e8373d70f2b6170b24.exe"C:\Users\Admin\AppData\Local\Temp\934e5538341e13807b5a173776e947596814f9dd2fd179e8373d70f2b6170b24.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\ProgramData\UBlockPlugin\plugin.exeC:\ProgramData\UBlockPlugin\plugin.exe "C:\Users\Admin\AppData\Local\Temp\934e5538341e13807b5a173776e947596814f9dd2fd179e8373d70f2b6170b24.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\UBlockPlugin\plugin.exe3⤵PID:3912
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 2204⤵
- Program crash
PID:3700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 2284⤵
- Program crash
PID:3524
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4260 -s 7323⤵
- Program crash
PID:2096
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4260 -s 7683⤵
- Program crash
PID:2348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4260 -s 8683⤵
- Program crash
PID:1500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4260 -s 8963⤵
- Program crash
PID:4344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4260 -s 7523⤵
- Program crash
PID:852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4260 -s 7403⤵
- Program crash
PID:2448
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4260 -ip 42601⤵PID:3664
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4260 -ip 42601⤵PID:4340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4260 -ip 42601⤵PID:1708
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4260 -ip 42601⤵PID:4520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4260 -ip 42601⤵PID:5076
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3912 -ip 39121⤵PID:1152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3912 -ip 39121⤵PID:5008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4260 -ip 42601⤵PID:1436
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239KB
MD5d9c64a5e7e3dd6aece2ae1dadba56b8f
SHA1e898639ea0f46754acd5d9102145e09602341ba7
SHA256934e5538341e13807b5a173776e947596814f9dd2fd179e8373d70f2b6170b24
SHA512317bbcbca132cfe33c84628af0765139c3b0c93c6f2f9b7e3047c378b64727eb40087e3a869e9014591cb126d7cf7a7e53e1ae183deab26755dfffdfbc87c097
-
Filesize
239KB
MD5d9c64a5e7e3dd6aece2ae1dadba56b8f
SHA1e898639ea0f46754acd5d9102145e09602341ba7
SHA256934e5538341e13807b5a173776e947596814f9dd2fd179e8373d70f2b6170b24
SHA512317bbcbca132cfe33c84628af0765139c3b0c93c6f2f9b7e3047c378b64727eb40087e3a869e9014591cb126d7cf7a7e53e1ae183deab26755dfffdfbc87c097