Analysis
-
max time kernel
65s -
max time network
86s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
01-07-2022 04:00
Static task
static1
Behavioral task
behavioral1
Sample
5ba2402e13843c844a0f2204aa72736f146cf1a8c9d1d569fa2379d21f86ef0f.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
5ba2402e13843c844a0f2204aa72736f146cf1a8c9d1d569fa2379d21f86ef0f.exe
Resource
win10v2004-20220414-en
General
-
Target
5ba2402e13843c844a0f2204aa72736f146cf1a8c9d1d569fa2379d21f86ef0f.exe
-
Size
1.7MB
-
MD5
cd8e0ff55fdfb32912795718b6b1542f
-
SHA1
ce9875fef041ebc5248eb41dfd3201ea4e5da76b
-
SHA256
5ba2402e13843c844a0f2204aa72736f146cf1a8c9d1d569fa2379d21f86ef0f
-
SHA512
4d36912e5ed28e037a5b63ffc95a50118c83ad244909a8e4e2c0d281bd1396903d2df6b0e48b4fd4f44d0a24f8b0e01f1d9b892c0ca591e98e7219351df10450
Malware Config
Extracted
buer
http://lodddd01.info/
http://lodddd02.info/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\UBlockPlugin\\plugin.exe\"" plugin.exe -
resource yara_rule behavioral1/memory/1172-60-0x000000003FF00000-0x0000000040365000-memory.dmp buer behavioral1/memory/2020-80-0x000000003F780000-0x000000003FBE5000-memory.dmp buer behavioral1/memory/2020-81-0x000000003F780000-0x000000003FBE5000-memory.dmp buer behavioral1/memory/2020-82-0x000000003F780000-0x000000003FBE5000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5ba2402e13843c844a0f2204aa72736f146cf1a8c9d1d569fa2379d21f86ef0f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ plugin.exe -
Executes dropped EXE 1 IoCs
pid Process 2020 plugin.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5ba2402e13843c844a0f2204aa72736f146cf1a8c9d1d569fa2379d21f86ef0f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5ba2402e13843c844a0f2204aa72736f146cf1a8c9d1d569fa2379d21f86ef0f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion plugin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion plugin.exe -
Deletes itself 1 IoCs
pid Process 2020 plugin.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Wine 5ba2402e13843c844a0f2204aa72736f146cf1a8c9d1d569fa2379d21f86ef0f.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Wine plugin.exe -
Loads dropped DLL 2 IoCs
pid Process 1172 5ba2402e13843c844a0f2204aa72736f146cf1a8c9d1d569fa2379d21f86ef0f.exe 1172 5ba2402e13843c844a0f2204aa72736f146cf1a8c9d1d569fa2379d21f86ef0f.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1172 5ba2402e13843c844a0f2204aa72736f146cf1a8c9d1d569fa2379d21f86ef0f.exe 2020 plugin.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1892 1280 WerFault.exe 28 1952 2020 WerFault.exe 27 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1172 5ba2402e13843c844a0f2204aa72736f146cf1a8c9d1d569fa2379d21f86ef0f.exe 2020 plugin.exe 2020 plugin.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1172 wrote to memory of 2020 1172 5ba2402e13843c844a0f2204aa72736f146cf1a8c9d1d569fa2379d21f86ef0f.exe 27 PID 1172 wrote to memory of 2020 1172 5ba2402e13843c844a0f2204aa72736f146cf1a8c9d1d569fa2379d21f86ef0f.exe 27 PID 1172 wrote to memory of 2020 1172 5ba2402e13843c844a0f2204aa72736f146cf1a8c9d1d569fa2379d21f86ef0f.exe 27 PID 1172 wrote to memory of 2020 1172 5ba2402e13843c844a0f2204aa72736f146cf1a8c9d1d569fa2379d21f86ef0f.exe 27 PID 2020 wrote to memory of 1280 2020 plugin.exe 28 PID 2020 wrote to memory of 1280 2020 plugin.exe 28 PID 2020 wrote to memory of 1280 2020 plugin.exe 28 PID 2020 wrote to memory of 1280 2020 plugin.exe 28 PID 2020 wrote to memory of 1280 2020 plugin.exe 28 PID 2020 wrote to memory of 1280 2020 plugin.exe 28 PID 2020 wrote to memory of 1280 2020 plugin.exe 28 PID 2020 wrote to memory of 1280 2020 plugin.exe 28 PID 2020 wrote to memory of 1280 2020 plugin.exe 28 PID 2020 wrote to memory of 1280 2020 plugin.exe 28 PID 2020 wrote to memory of 1280 2020 plugin.exe 28 PID 2020 wrote to memory of 1280 2020 plugin.exe 28 PID 2020 wrote to memory of 1280 2020 plugin.exe 28 PID 1280 wrote to memory of 1892 1280 secinit.exe 29 PID 1280 wrote to memory of 1892 1280 secinit.exe 29 PID 1280 wrote to memory of 1892 1280 secinit.exe 29 PID 1280 wrote to memory of 1892 1280 secinit.exe 29 PID 2020 wrote to memory of 1952 2020 plugin.exe 30 PID 2020 wrote to memory of 1952 2020 plugin.exe 30 PID 2020 wrote to memory of 1952 2020 plugin.exe 30 PID 2020 wrote to memory of 1952 2020 plugin.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ba2402e13843c844a0f2204aa72736f146cf1a8c9d1d569fa2379d21f86ef0f.exe"C:\Users\Admin\AppData\Local\Temp\5ba2402e13843c844a0f2204aa72736f146cf1a8c9d1d569fa2379d21f86ef0f.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\ProgramData\UBlockPlugin\plugin.exeC:\ProgramData\UBlockPlugin\plugin.exe "C:\Users\Admin\AppData\Local\Temp\5ba2402e13843c844a0f2204aa72736f146cf1a8c9d1d569fa2379d21f86ef0f.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Deletes itself
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\UBlockPlugin\plugin.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1280 -s 1364⤵
- Program crash
PID:1892
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2020 -s 5643⤵
- Program crash
PID:1952
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5cd8e0ff55fdfb32912795718b6b1542f
SHA1ce9875fef041ebc5248eb41dfd3201ea4e5da76b
SHA2565ba2402e13843c844a0f2204aa72736f146cf1a8c9d1d569fa2379d21f86ef0f
SHA5124d36912e5ed28e037a5b63ffc95a50118c83ad244909a8e4e2c0d281bd1396903d2df6b0e48b4fd4f44d0a24f8b0e01f1d9b892c0ca591e98e7219351df10450
-
Filesize
1.7MB
MD5cd8e0ff55fdfb32912795718b6b1542f
SHA1ce9875fef041ebc5248eb41dfd3201ea4e5da76b
SHA2565ba2402e13843c844a0f2204aa72736f146cf1a8c9d1d569fa2379d21f86ef0f
SHA5124d36912e5ed28e037a5b63ffc95a50118c83ad244909a8e4e2c0d281bd1396903d2df6b0e48b4fd4f44d0a24f8b0e01f1d9b892c0ca591e98e7219351df10450
-
Filesize
1.7MB
MD5cd8e0ff55fdfb32912795718b6b1542f
SHA1ce9875fef041ebc5248eb41dfd3201ea4e5da76b
SHA2565ba2402e13843c844a0f2204aa72736f146cf1a8c9d1d569fa2379d21f86ef0f
SHA5124d36912e5ed28e037a5b63ffc95a50118c83ad244909a8e4e2c0d281bd1396903d2df6b0e48b4fd4f44d0a24f8b0e01f1d9b892c0ca591e98e7219351df10450
-
Filesize
1.7MB
MD5cd8e0ff55fdfb32912795718b6b1542f
SHA1ce9875fef041ebc5248eb41dfd3201ea4e5da76b
SHA2565ba2402e13843c844a0f2204aa72736f146cf1a8c9d1d569fa2379d21f86ef0f
SHA5124d36912e5ed28e037a5b63ffc95a50118c83ad244909a8e4e2c0d281bd1396903d2df6b0e48b4fd4f44d0a24f8b0e01f1d9b892c0ca591e98e7219351df10450