Analysis
-
max time kernel
55s -
max time network
57s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-07-2022 05:57
Static task
static1
Behavioral task
behavioral1
Sample
415ecf85cc1e03aa1ec4628e4fb918f3a7bcc698604e47e370d92659894669dc.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
415ecf85cc1e03aa1ec4628e4fb918f3a7bcc698604e47e370d92659894669dc.exe
Resource
win10v2004-20220414-en
General
-
Target
415ecf85cc1e03aa1ec4628e4fb918f3a7bcc698604e47e370d92659894669dc.exe
-
Size
1.8MB
-
MD5
62cb54ffe0ba447c2b4eefbefca59ab6
-
SHA1
f96865aa57c7f17f196aa6f219ee90726dd3962e
-
SHA256
415ecf85cc1e03aa1ec4628e4fb918f3a7bcc698604e47e370d92659894669dc
-
SHA512
4dacd5f17d78f7e551c8867cda3cea1fccdb0dead9ee1a45a5f4496fe71521255db67bc2895328cbf1396a01a831f03f99df2cbd4f1c61227150ac1ff35ffbf9
Malware Config
Extracted
buer
http://loy01.top/
http://loy02.top/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\UBlockPlugin\\plugin.exe\"" plugin.exe -
resource yara_rule behavioral1/memory/2044-55-0x000000003F7A0000-0x000000003FC16000-memory.dmp buer behavioral1/memory/2044-57-0x000000003F7A0000-0x000000003FC16000-memory.dmp buer behavioral1/memory/2044-62-0x000000003F7A0000-0x000000003FC16000-memory.dmp buer behavioral1/memory/1804-67-0x000000003FDD0000-0x0000000040246000-memory.dmp buer behavioral1/memory/1804-83-0x000000003FDD0000-0x0000000040246000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ plugin.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 415ecf85cc1e03aa1ec4628e4fb918f3a7bcc698604e47e370d92659894669dc.exe -
Executes dropped EXE 1 IoCs
pid Process 1804 plugin.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion plugin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion plugin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 415ecf85cc1e03aa1ec4628e4fb918f3a7bcc698604e47e370d92659894669dc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 415ecf85cc1e03aa1ec4628e4fb918f3a7bcc698604e47e370d92659894669dc.exe -
Deletes itself 1 IoCs
pid Process 1804 plugin.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Wine 415ecf85cc1e03aa1ec4628e4fb918f3a7bcc698604e47e370d92659894669dc.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Wine plugin.exe -
Loads dropped DLL 2 IoCs
pid Process 2044 415ecf85cc1e03aa1ec4628e4fb918f3a7bcc698604e47e370d92659894669dc.exe 2044 415ecf85cc1e03aa1ec4628e4fb918f3a7bcc698604e47e370d92659894669dc.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2044 415ecf85cc1e03aa1ec4628e4fb918f3a7bcc698604e47e370d92659894669dc.exe 1804 plugin.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2000 1900 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2044 415ecf85cc1e03aa1ec4628e4fb918f3a7bcc698604e47e370d92659894669dc.exe 1804 plugin.exe 1804 plugin.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2044 wrote to memory of 1804 2044 415ecf85cc1e03aa1ec4628e4fb918f3a7bcc698604e47e370d92659894669dc.exe 27 PID 2044 wrote to memory of 1804 2044 415ecf85cc1e03aa1ec4628e4fb918f3a7bcc698604e47e370d92659894669dc.exe 27 PID 2044 wrote to memory of 1804 2044 415ecf85cc1e03aa1ec4628e4fb918f3a7bcc698604e47e370d92659894669dc.exe 27 PID 2044 wrote to memory of 1804 2044 415ecf85cc1e03aa1ec4628e4fb918f3a7bcc698604e47e370d92659894669dc.exe 27 PID 1804 wrote to memory of 1900 1804 plugin.exe 28 PID 1804 wrote to memory of 1900 1804 plugin.exe 28 PID 1804 wrote to memory of 1900 1804 plugin.exe 28 PID 1804 wrote to memory of 1900 1804 plugin.exe 28 PID 1804 wrote to memory of 1900 1804 plugin.exe 28 PID 1804 wrote to memory of 1900 1804 plugin.exe 28 PID 1804 wrote to memory of 1900 1804 plugin.exe 28 PID 1804 wrote to memory of 1900 1804 plugin.exe 28 PID 1804 wrote to memory of 1900 1804 plugin.exe 28 PID 1804 wrote to memory of 1900 1804 plugin.exe 28 PID 1804 wrote to memory of 1900 1804 plugin.exe 28 PID 1804 wrote to memory of 1900 1804 plugin.exe 28 PID 1804 wrote to memory of 1900 1804 plugin.exe 28 PID 1900 wrote to memory of 2000 1900 secinit.exe 29 PID 1900 wrote to memory of 2000 1900 secinit.exe 29 PID 1900 wrote to memory of 2000 1900 secinit.exe 29 PID 1900 wrote to memory of 2000 1900 secinit.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\415ecf85cc1e03aa1ec4628e4fb918f3a7bcc698604e47e370d92659894669dc.exe"C:\Users\Admin\AppData\Local\Temp\415ecf85cc1e03aa1ec4628e4fb918f3a7bcc698604e47e370d92659894669dc.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\ProgramData\UBlockPlugin\plugin.exeC:\ProgramData\UBlockPlugin\plugin.exe "C:\Users\Admin\AppData\Local\Temp\415ecf85cc1e03aa1ec4628e4fb918f3a7bcc698604e47e370d92659894669dc.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Deletes itself
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\UBlockPlugin\plugin.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 1364⤵
- Program crash
PID:2000
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD562cb54ffe0ba447c2b4eefbefca59ab6
SHA1f96865aa57c7f17f196aa6f219ee90726dd3962e
SHA256415ecf85cc1e03aa1ec4628e4fb918f3a7bcc698604e47e370d92659894669dc
SHA5124dacd5f17d78f7e551c8867cda3cea1fccdb0dead9ee1a45a5f4496fe71521255db67bc2895328cbf1396a01a831f03f99df2cbd4f1c61227150ac1ff35ffbf9
-
Filesize
1.8MB
MD562cb54ffe0ba447c2b4eefbefca59ab6
SHA1f96865aa57c7f17f196aa6f219ee90726dd3962e
SHA256415ecf85cc1e03aa1ec4628e4fb918f3a7bcc698604e47e370d92659894669dc
SHA5124dacd5f17d78f7e551c8867cda3cea1fccdb0dead9ee1a45a5f4496fe71521255db67bc2895328cbf1396a01a831f03f99df2cbd4f1c61227150ac1ff35ffbf9
-
Filesize
1.8MB
MD562cb54ffe0ba447c2b4eefbefca59ab6
SHA1f96865aa57c7f17f196aa6f219ee90726dd3962e
SHA256415ecf85cc1e03aa1ec4628e4fb918f3a7bcc698604e47e370d92659894669dc
SHA5124dacd5f17d78f7e551c8867cda3cea1fccdb0dead9ee1a45a5f4496fe71521255db67bc2895328cbf1396a01a831f03f99df2cbd4f1c61227150ac1ff35ffbf9
-
Filesize
1.8MB
MD562cb54ffe0ba447c2b4eefbefca59ab6
SHA1f96865aa57c7f17f196aa6f219ee90726dd3962e
SHA256415ecf85cc1e03aa1ec4628e4fb918f3a7bcc698604e47e370d92659894669dc
SHA5124dacd5f17d78f7e551c8867cda3cea1fccdb0dead9ee1a45a5f4496fe71521255db67bc2895328cbf1396a01a831f03f99df2cbd4f1c61227150ac1ff35ffbf9