Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
24-07-2022 22:36
Static task
static1
Behavioral task
behavioral1
Sample
d2930279448fd7ae1432dfe5d1de37c9e5c924e5466ab49763e8de671b24c511.exe
Resource
win7-20220718-en
General
-
Target
d2930279448fd7ae1432dfe5d1de37c9e5c924e5466ab49763e8de671b24c511.exe
-
Size
1.6MB
-
MD5
27eff943a9a321407709d92ef5f99667
-
SHA1
1c6a9de56ae6db79d1ade91876baeda42c0d3819
-
SHA256
d2930279448fd7ae1432dfe5d1de37c9e5c924e5466ab49763e8de671b24c511
-
SHA512
f43a9781e3148105682237897682dd8f289fb4cbb1f21e4e329ece0d04ee0f903a6f664cd7fa5a3d9ccdcbfe96ba37e5d79e909fc84b12ba426dcf03024590f3
Malware Config
Extracted
buer
https://loddd01.info/
https://loddd02.info/
Signatures
-
resource yara_rule behavioral2/memory/4576-132-0x000000003FAE0000-0x000000003FF19000-memory.dmp buer behavioral2/memory/4576-133-0x000000003FAE0000-0x000000003FF19000-memory.dmp buer behavioral2/memory/4576-134-0x000000003FAE0000-0x000000003FF19000-memory.dmp buer behavioral2/memory/4576-138-0x000000003FAE0000-0x000000003FF19000-memory.dmp buer behavioral2/memory/3312-142-0x000000003FDB0000-0x00000000401E9000-memory.dmp buer behavioral2/memory/3312-143-0x000000003FDB0000-0x00000000401E9000-memory.dmp buer behavioral2/memory/3312-144-0x000000003FDB0000-0x00000000401E9000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ plugin.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d2930279448fd7ae1432dfe5d1de37c9e5c924e5466ab49763e8de671b24c511.exe -
Executes dropped EXE 1 IoCs
pid Process 3312 plugin.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d2930279448fd7ae1432dfe5d1de37c9e5c924e5466ab49763e8de671b24c511.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d2930279448fd7ae1432dfe5d1de37c9e5c924e5466ab49763e8de671b24c511.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion plugin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion plugin.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Software\Wine d2930279448fd7ae1432dfe5d1de37c9e5c924e5466ab49763e8de671b24c511.exe Key opened \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Software\Wine plugin.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4576 d2930279448fd7ae1432dfe5d1de37c9e5c924e5466ab49763e8de671b24c511.exe 3312 plugin.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 452 2572 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4576 d2930279448fd7ae1432dfe5d1de37c9e5c924e5466ab49763e8de671b24c511.exe 4576 d2930279448fd7ae1432dfe5d1de37c9e5c924e5466ab49763e8de671b24c511.exe 3312 plugin.exe 3312 plugin.exe 3312 plugin.exe 3312 plugin.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4576 wrote to memory of 3312 4576 d2930279448fd7ae1432dfe5d1de37c9e5c924e5466ab49763e8de671b24c511.exe 84 PID 4576 wrote to memory of 3312 4576 d2930279448fd7ae1432dfe5d1de37c9e5c924e5466ab49763e8de671b24c511.exe 84 PID 4576 wrote to memory of 3312 4576 d2930279448fd7ae1432dfe5d1de37c9e5c924e5466ab49763e8de671b24c511.exe 84 PID 3312 wrote to memory of 2572 3312 plugin.exe 85 PID 3312 wrote to memory of 2572 3312 plugin.exe 85 PID 3312 wrote to memory of 2572 3312 plugin.exe 85 PID 3312 wrote to memory of 2572 3312 plugin.exe 85 PID 3312 wrote to memory of 2572 3312 plugin.exe 85 PID 3312 wrote to memory of 2572 3312 plugin.exe 85 PID 3312 wrote to memory of 2572 3312 plugin.exe 85 PID 3312 wrote to memory of 2572 3312 plugin.exe 85 PID 3312 wrote to memory of 2572 3312 plugin.exe 85 PID 3312 wrote to memory of 2572 3312 plugin.exe 85 PID 3312 wrote to memory of 2572 3312 plugin.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2930279448fd7ae1432dfe5d1de37c9e5c924e5466ab49763e8de671b24c511.exe"C:\Users\Admin\AppData\Local\Temp\d2930279448fd7ae1432dfe5d1de37c9e5c924e5466ab49763e8de671b24c511.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\ProgramData\UBlockPlugin\plugin.exeC:\ProgramData\UBlockPlugin\plugin.exe "C:\Users\Admin\AppData\Local\Temp\d2930279448fd7ae1432dfe5d1de37c9e5c924e5466ab49763e8de671b24c511.exe" ensgJJ2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\UBlockPlugin\plugin.exe3⤵PID:2572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2572 -s 2204⤵
- Program crash
PID:452
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 2572 -ip 25721⤵PID:4156
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD527eff943a9a321407709d92ef5f99667
SHA11c6a9de56ae6db79d1ade91876baeda42c0d3819
SHA256d2930279448fd7ae1432dfe5d1de37c9e5c924e5466ab49763e8de671b24c511
SHA512f43a9781e3148105682237897682dd8f289fb4cbb1f21e4e329ece0d04ee0f903a6f664cd7fa5a3d9ccdcbfe96ba37e5d79e909fc84b12ba426dcf03024590f3
-
Filesize
1.6MB
MD527eff943a9a321407709d92ef5f99667
SHA11c6a9de56ae6db79d1ade91876baeda42c0d3819
SHA256d2930279448fd7ae1432dfe5d1de37c9e5c924e5466ab49763e8de671b24c511
SHA512f43a9781e3148105682237897682dd8f289fb4cbb1f21e4e329ece0d04ee0f903a6f664cd7fa5a3d9ccdcbfe96ba37e5d79e909fc84b12ba426dcf03024590f3