Analysis
-
max time kernel
152s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
08-07-2022 05:57
Static task
static1
Behavioral task
behavioral1
Sample
415ecf85cc1e03aa1ec4628e4fb918f3a7bcc698604e47e370d92659894669dc.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
415ecf85cc1e03aa1ec4628e4fb918f3a7bcc698604e47e370d92659894669dc.exe
Resource
win10v2004-20220414-en
General
-
Target
415ecf85cc1e03aa1ec4628e4fb918f3a7bcc698604e47e370d92659894669dc.exe
-
Size
1.8MB
-
MD5
62cb54ffe0ba447c2b4eefbefca59ab6
-
SHA1
f96865aa57c7f17f196aa6f219ee90726dd3962e
-
SHA256
415ecf85cc1e03aa1ec4628e4fb918f3a7bcc698604e47e370d92659894669dc
-
SHA512
4dacd5f17d78f7e551c8867cda3cea1fccdb0dead9ee1a45a5f4496fe71521255db67bc2895328cbf1396a01a831f03f99df2cbd4f1c61227150ac1ff35ffbf9
Malware Config
Extracted
buer
http://loy01.top/
http://loy02.top/
cook5**gjt+,)ojk*
cook5**gjt+-)ojk*
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\UBlockPlugin\\plugin.exe\"" plugin.exe -
resource yara_rule behavioral2/memory/3292-134-0x000000003F160000-0x000000003F5D6000-memory.dmp buer behavioral2/memory/4584-137-0x000000003F310000-0x000000003F786000-memory.dmp buer behavioral2/memory/4584-139-0x000000003F310000-0x000000003F786000-memory.dmp buer behavioral2/memory/4584-141-0x000000003F310000-0x000000003F786000-memory.dmp buer behavioral2/memory/4584-142-0x000000003F310000-0x000000003F786000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ plugin.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 415ecf85cc1e03aa1ec4628e4fb918f3a7bcc698604e47e370d92659894669dc.exe -
Executes dropped EXE 1 IoCs
pid Process 4584 plugin.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 415ecf85cc1e03aa1ec4628e4fb918f3a7bcc698604e47e370d92659894669dc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 415ecf85cc1e03aa1ec4628e4fb918f3a7bcc698604e47e370d92659894669dc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion plugin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion plugin.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Wine 415ecf85cc1e03aa1ec4628e4fb918f3a7bcc698604e47e370d92659894669dc.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Wine plugin.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3292 415ecf85cc1e03aa1ec4628e4fb918f3a7bcc698604e47e370d92659894669dc.exe 4584 plugin.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4656 1296 WerFault.exe 81 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3292 415ecf85cc1e03aa1ec4628e4fb918f3a7bcc698604e47e370d92659894669dc.exe 3292 415ecf85cc1e03aa1ec4628e4fb918f3a7bcc698604e47e370d92659894669dc.exe 4584 plugin.exe 4584 plugin.exe 4584 plugin.exe 4584 plugin.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3292 wrote to memory of 4584 3292 415ecf85cc1e03aa1ec4628e4fb918f3a7bcc698604e47e370d92659894669dc.exe 80 PID 3292 wrote to memory of 4584 3292 415ecf85cc1e03aa1ec4628e4fb918f3a7bcc698604e47e370d92659894669dc.exe 80 PID 3292 wrote to memory of 4584 3292 415ecf85cc1e03aa1ec4628e4fb918f3a7bcc698604e47e370d92659894669dc.exe 80 PID 4584 wrote to memory of 1296 4584 plugin.exe 81 PID 4584 wrote to memory of 1296 4584 plugin.exe 81 PID 4584 wrote to memory of 1296 4584 plugin.exe 81 PID 4584 wrote to memory of 1296 4584 plugin.exe 81 PID 4584 wrote to memory of 1296 4584 plugin.exe 81 PID 4584 wrote to memory of 1296 4584 plugin.exe 81 PID 4584 wrote to memory of 1296 4584 plugin.exe 81 PID 4584 wrote to memory of 1296 4584 plugin.exe 81 PID 4584 wrote to memory of 1296 4584 plugin.exe 81 PID 4584 wrote to memory of 1296 4584 plugin.exe 81 PID 4584 wrote to memory of 1296 4584 plugin.exe 81 PID 4584 wrote to memory of 1296 4584 plugin.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\415ecf85cc1e03aa1ec4628e4fb918f3a7bcc698604e47e370d92659894669dc.exe"C:\Users\Admin\AppData\Local\Temp\415ecf85cc1e03aa1ec4628e4fb918f3a7bcc698604e47e370d92659894669dc.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\ProgramData\UBlockPlugin\plugin.exeC:\ProgramData\UBlockPlugin\plugin.exe "C:\Users\Admin\AppData\Local\Temp\415ecf85cc1e03aa1ec4628e4fb918f3a7bcc698604e47e370d92659894669dc.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\UBlockPlugin\plugin.exe3⤵PID:1296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1296 -s 2204⤵
- Program crash
PID:4656
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1296 -ip 12961⤵PID:3568
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD562cb54ffe0ba447c2b4eefbefca59ab6
SHA1f96865aa57c7f17f196aa6f219ee90726dd3962e
SHA256415ecf85cc1e03aa1ec4628e4fb918f3a7bcc698604e47e370d92659894669dc
SHA5124dacd5f17d78f7e551c8867cda3cea1fccdb0dead9ee1a45a5f4496fe71521255db67bc2895328cbf1396a01a831f03f99df2cbd4f1c61227150ac1ff35ffbf9
-
Filesize
1.8MB
MD562cb54ffe0ba447c2b4eefbefca59ab6
SHA1f96865aa57c7f17f196aa6f219ee90726dd3962e
SHA256415ecf85cc1e03aa1ec4628e4fb918f3a7bcc698604e47e370d92659894669dc
SHA5124dacd5f17d78f7e551c8867cda3cea1fccdb0dead9ee1a45a5f4496fe71521255db67bc2895328cbf1396a01a831f03f99df2cbd4f1c61227150ac1ff35ffbf9