Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
01-07-2022 04:07
Static task
static1
Behavioral task
behavioral1
Sample
f73cf8983ba1581437ef86a24e97cde0929d9ee8d5224a834ab55353cb0fb5f3.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
f73cf8983ba1581437ef86a24e97cde0929d9ee8d5224a834ab55353cb0fb5f3.exe
Resource
win10v2004-20220414-en
General
-
Target
f73cf8983ba1581437ef86a24e97cde0929d9ee8d5224a834ab55353cb0fb5f3.exe
-
Size
1.7MB
-
MD5
85851bc9cecff7ec618e498f2f52ab5a
-
SHA1
21f4efb62167f1e9b4f82d41ba3d09b58856f201
-
SHA256
f73cf8983ba1581437ef86a24e97cde0929d9ee8d5224a834ab55353cb0fb5f3
-
SHA512
c6cac25fd43ff4d821f991c19ecf47a2f8dcf66fdbff1ce377611093b7db925b0587bd15db23061bd03ae1ad380c6362c644734a5f6ae0e3e723c1500c62813f
Malware Config
Extracted
buer
http://kload01.info/
http://kload02.info/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\UBlockPlugin\\plugin.exe\"" plugin.exe -
resource yara_rule behavioral2/memory/4284-132-0x000000003F580000-0x000000003F9D4000-memory.dmp buer behavioral2/memory/4284-133-0x000000003F580000-0x000000003F9D4000-memory.dmp buer behavioral2/memory/4284-135-0x000000003F580000-0x000000003F9D4000-memory.dmp buer behavioral2/memory/4284-139-0x000000003F580000-0x000000003F9D4000-memory.dmp buer behavioral2/memory/1016-142-0x000000003F5F0000-0x000000003FA44000-memory.dmp buer behavioral2/memory/1016-143-0x000000003F5F0000-0x000000003FA44000-memory.dmp buer behavioral2/memory/1016-144-0x000000003F5F0000-0x000000003FA44000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f73cf8983ba1581437ef86a24e97cde0929d9ee8d5224a834ab55353cb0fb5f3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ plugin.exe -
Executes dropped EXE 1 IoCs
pid Process 1016 plugin.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion plugin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion plugin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f73cf8983ba1581437ef86a24e97cde0929d9ee8d5224a834ab55353cb0fb5f3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f73cf8983ba1581437ef86a24e97cde0929d9ee8d5224a834ab55353cb0fb5f3.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Wine f73cf8983ba1581437ef86a24e97cde0929d9ee8d5224a834ab55353cb0fb5f3.exe Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Wine plugin.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4284 f73cf8983ba1581437ef86a24e97cde0929d9ee8d5224a834ab55353cb0fb5f3.exe 1016 plugin.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 384 5044 WerFault.exe 91 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4284 f73cf8983ba1581437ef86a24e97cde0929d9ee8d5224a834ab55353cb0fb5f3.exe 4284 f73cf8983ba1581437ef86a24e97cde0929d9ee8d5224a834ab55353cb0fb5f3.exe 1016 plugin.exe 1016 plugin.exe 1016 plugin.exe 1016 plugin.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4284 wrote to memory of 1016 4284 f73cf8983ba1581437ef86a24e97cde0929d9ee8d5224a834ab55353cb0fb5f3.exe 90 PID 4284 wrote to memory of 1016 4284 f73cf8983ba1581437ef86a24e97cde0929d9ee8d5224a834ab55353cb0fb5f3.exe 90 PID 4284 wrote to memory of 1016 4284 f73cf8983ba1581437ef86a24e97cde0929d9ee8d5224a834ab55353cb0fb5f3.exe 90 PID 1016 wrote to memory of 5044 1016 plugin.exe 91 PID 1016 wrote to memory of 5044 1016 plugin.exe 91 PID 1016 wrote to memory of 5044 1016 plugin.exe 91 PID 1016 wrote to memory of 5044 1016 plugin.exe 91 PID 1016 wrote to memory of 5044 1016 plugin.exe 91 PID 1016 wrote to memory of 5044 1016 plugin.exe 91 PID 1016 wrote to memory of 5044 1016 plugin.exe 91 PID 1016 wrote to memory of 5044 1016 plugin.exe 91 PID 1016 wrote to memory of 5044 1016 plugin.exe 91 PID 1016 wrote to memory of 5044 1016 plugin.exe 91 PID 1016 wrote to memory of 5044 1016 plugin.exe 91 PID 1016 wrote to memory of 5044 1016 plugin.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\f73cf8983ba1581437ef86a24e97cde0929d9ee8d5224a834ab55353cb0fb5f3.exe"C:\Users\Admin\AppData\Local\Temp\f73cf8983ba1581437ef86a24e97cde0929d9ee8d5224a834ab55353cb0fb5f3.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\ProgramData\UBlockPlugin\plugin.exeC:\ProgramData\UBlockPlugin\plugin.exe "C:\Users\Admin\AppData\Local\Temp\f73cf8983ba1581437ef86a24e97cde0929d9ee8d5224a834ab55353cb0fb5f3.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\UBlockPlugin\plugin.exe3⤵PID:5044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 2204⤵
- Program crash
PID:384
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5044 -ip 50441⤵PID:4880
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD585851bc9cecff7ec618e498f2f52ab5a
SHA121f4efb62167f1e9b4f82d41ba3d09b58856f201
SHA256f73cf8983ba1581437ef86a24e97cde0929d9ee8d5224a834ab55353cb0fb5f3
SHA512c6cac25fd43ff4d821f991c19ecf47a2f8dcf66fdbff1ce377611093b7db925b0587bd15db23061bd03ae1ad380c6362c644734a5f6ae0e3e723c1500c62813f
-
Filesize
1.7MB
MD585851bc9cecff7ec618e498f2f52ab5a
SHA121f4efb62167f1e9b4f82d41ba3d09b58856f201
SHA256f73cf8983ba1581437ef86a24e97cde0929d9ee8d5224a834ab55353cb0fb5f3
SHA512c6cac25fd43ff4d821f991c19ecf47a2f8dcf66fdbff1ce377611093b7db925b0587bd15db23061bd03ae1ad380c6362c644734a5f6ae0e3e723c1500c62813f