Analysis
-
max time kernel
152s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
01-07-2022 04:00
Static task
static1
Behavioral task
behavioral1
Sample
5ba2402e13843c844a0f2204aa72736f146cf1a8c9d1d569fa2379d21f86ef0f.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
5ba2402e13843c844a0f2204aa72736f146cf1a8c9d1d569fa2379d21f86ef0f.exe
Resource
win10v2004-20220414-en
General
-
Target
5ba2402e13843c844a0f2204aa72736f146cf1a8c9d1d569fa2379d21f86ef0f.exe
-
Size
1.7MB
-
MD5
cd8e0ff55fdfb32912795718b6b1542f
-
SHA1
ce9875fef041ebc5248eb41dfd3201ea4e5da76b
-
SHA256
5ba2402e13843c844a0f2204aa72736f146cf1a8c9d1d569fa2379d21f86ef0f
-
SHA512
4d36912e5ed28e037a5b63ffc95a50118c83ad244909a8e4e2c0d281bd1396903d2df6b0e48b4fd4f44d0a24f8b0e01f1d9b892c0ca591e98e7219351df10450
Malware Config
Extracted
buer
http://lodddd01.info/
http://lodddd02.info/
cook5**gj____+,)diaj*
cook5**gj____+-)diaj*
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\UBlockPlugin\\plugin.exe\"" plugin.exe -
resource yara_rule behavioral2/memory/4348-134-0x000000003FC30000-0x0000000040095000-memory.dmp buer behavioral2/memory/3564-138-0x000000003FE70000-0x00000000402D5000-memory.dmp buer behavioral2/memory/3564-139-0x000000003FE70000-0x00000000402D5000-memory.dmp buer behavioral2/memory/3564-141-0x000000003FE70000-0x00000000402D5000-memory.dmp buer behavioral2/memory/3564-143-0x000000003FE70000-0x00000000402D5000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5ba2402e13843c844a0f2204aa72736f146cf1a8c9d1d569fa2379d21f86ef0f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ plugin.exe -
Executes dropped EXE 1 IoCs
pid Process 3564 plugin.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5ba2402e13843c844a0f2204aa72736f146cf1a8c9d1d569fa2379d21f86ef0f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5ba2402e13843c844a0f2204aa72736f146cf1a8c9d1d569fa2379d21f86ef0f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion plugin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion plugin.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Wine 5ba2402e13843c844a0f2204aa72736f146cf1a8c9d1d569fa2379d21f86ef0f.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Wine plugin.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4348 5ba2402e13843c844a0f2204aa72736f146cf1a8c9d1d569fa2379d21f86ef0f.exe 3564 plugin.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1656 1480 WerFault.exe 80 4456 3564 WerFault.exe 79 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4348 5ba2402e13843c844a0f2204aa72736f146cf1a8c9d1d569fa2379d21f86ef0f.exe 4348 5ba2402e13843c844a0f2204aa72736f146cf1a8c9d1d569fa2379d21f86ef0f.exe 3564 plugin.exe 3564 plugin.exe 3564 plugin.exe 3564 plugin.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4348 wrote to memory of 3564 4348 5ba2402e13843c844a0f2204aa72736f146cf1a8c9d1d569fa2379d21f86ef0f.exe 79 PID 4348 wrote to memory of 3564 4348 5ba2402e13843c844a0f2204aa72736f146cf1a8c9d1d569fa2379d21f86ef0f.exe 79 PID 4348 wrote to memory of 3564 4348 5ba2402e13843c844a0f2204aa72736f146cf1a8c9d1d569fa2379d21f86ef0f.exe 79 PID 3564 wrote to memory of 1480 3564 plugin.exe 80 PID 3564 wrote to memory of 1480 3564 plugin.exe 80 PID 3564 wrote to memory of 1480 3564 plugin.exe 80 PID 3564 wrote to memory of 1480 3564 plugin.exe 80 PID 3564 wrote to memory of 1480 3564 plugin.exe 80 PID 3564 wrote to memory of 1480 3564 plugin.exe 80 PID 3564 wrote to memory of 1480 3564 plugin.exe 80 PID 3564 wrote to memory of 1480 3564 plugin.exe 80 PID 3564 wrote to memory of 1480 3564 plugin.exe 80 PID 3564 wrote to memory of 1480 3564 plugin.exe 80 PID 3564 wrote to memory of 1480 3564 plugin.exe 80 PID 3564 wrote to memory of 1480 3564 plugin.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ba2402e13843c844a0f2204aa72736f146cf1a8c9d1d569fa2379d21f86ef0f.exe"C:\Users\Admin\AppData\Local\Temp\5ba2402e13843c844a0f2204aa72736f146cf1a8c9d1d569fa2379d21f86ef0f.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\ProgramData\UBlockPlugin\plugin.exeC:\ProgramData\UBlockPlugin\plugin.exe "C:\Users\Admin\AppData\Local\Temp\5ba2402e13843c844a0f2204aa72736f146cf1a8c9d1d569fa2379d21f86ef0f.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\UBlockPlugin\plugin.exe3⤵PID:1480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1480 -s 2204⤵
- Program crash
PID:1656
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3564 -s 11563⤵
- Program crash
PID:4456
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1480 -ip 14801⤵PID:4168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3564 -ip 35641⤵PID:2592
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5cd8e0ff55fdfb32912795718b6b1542f
SHA1ce9875fef041ebc5248eb41dfd3201ea4e5da76b
SHA2565ba2402e13843c844a0f2204aa72736f146cf1a8c9d1d569fa2379d21f86ef0f
SHA5124d36912e5ed28e037a5b63ffc95a50118c83ad244909a8e4e2c0d281bd1396903d2df6b0e48b4fd4f44d0a24f8b0e01f1d9b892c0ca591e98e7219351df10450
-
Filesize
1.7MB
MD5cd8e0ff55fdfb32912795718b6b1542f
SHA1ce9875fef041ebc5248eb41dfd3201ea4e5da76b
SHA2565ba2402e13843c844a0f2204aa72736f146cf1a8c9d1d569fa2379d21f86ef0f
SHA5124d36912e5ed28e037a5b63ffc95a50118c83ad244909a8e4e2c0d281bd1396903d2df6b0e48b4fd4f44d0a24f8b0e01f1d9b892c0ca591e98e7219351df10450