Analysis
-
max time kernel
33s -
max time network
65s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
24-07-2022 17:40
Static task
static1
Behavioral task
behavioral1
Sample
9431b3a7e09d260d61fd0363e29c865d092976f2695339a8e6152fa1f1db4fda.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
9431b3a7e09d260d61fd0363e29c865d092976f2695339a8e6152fa1f1db4fda.exe
Resource
win10v2004-20220721-en
General
-
Target
9431b3a7e09d260d61fd0363e29c865d092976f2695339a8e6152fa1f1db4fda.exe
-
Size
1.8MB
-
MD5
329bd1008c63fa9abf81cd6afd7a6559
-
SHA1
d07885a5899b13294672a3f396ec445dd8b09529
-
SHA256
9431b3a7e09d260d61fd0363e29c865d092976f2695339a8e6152fa1f1db4fda
-
SHA512
289f56d591ed7c542d0dec58a5d107713af35f2b50f1bb6ccc841c8114b833942d47c4c9da8061e750ccd1ab06649dfb4a039d6a658807c82a8e95b0afcaf78f
Malware Config
Extracted
buer
http://loy01.top/
http://loy02.top/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\UBlockPlugin\\plugin.exe\"" plugin.exe -
resource yara_rule behavioral1/memory/1896-58-0x000000003FCB0000-0x0000000040135000-memory.dmp buer behavioral1/memory/2036-63-0x0000000076EB0000-0x0000000077030000-memory.dmp buer behavioral1/memory/2036-64-0x000000003F050000-0x000000003F4D5000-memory.dmp buer behavioral1/memory/2036-67-0x000000003F050000-0x000000003F4D5000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9431b3a7e09d260d61fd0363e29c865d092976f2695339a8e6152fa1f1db4fda.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ plugin.exe -
Executes dropped EXE 1 IoCs
pid Process 2036 plugin.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9431b3a7e09d260d61fd0363e29c865d092976f2695339a8e6152fa1f1db4fda.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9431b3a7e09d260d61fd0363e29c865d092976f2695339a8e6152fa1f1db4fda.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion plugin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion plugin.exe -
Deletes itself 1 IoCs
pid Process 2036 plugin.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Wine 9431b3a7e09d260d61fd0363e29c865d092976f2695339a8e6152fa1f1db4fda.exe Key opened \REGISTRY\USER\S-1-5-21-4084403625-2215941253-1760665084-1000\Software\Wine plugin.exe -
Loads dropped DLL 2 IoCs
pid Process 1896 9431b3a7e09d260d61fd0363e29c865d092976f2695339a8e6152fa1f1db4fda.exe 1896 9431b3a7e09d260d61fd0363e29c865d092976f2695339a8e6152fa1f1db4fda.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1896 9431b3a7e09d260d61fd0363e29c865d092976f2695339a8e6152fa1f1db4fda.exe 2036 plugin.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1896 9431b3a7e09d260d61fd0363e29c865d092976f2695339a8e6152fa1f1db4fda.exe 2036 plugin.exe 2036 plugin.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1896 wrote to memory of 2036 1896 9431b3a7e09d260d61fd0363e29c865d092976f2695339a8e6152fa1f1db4fda.exe 28 PID 1896 wrote to memory of 2036 1896 9431b3a7e09d260d61fd0363e29c865d092976f2695339a8e6152fa1f1db4fda.exe 28 PID 1896 wrote to memory of 2036 1896 9431b3a7e09d260d61fd0363e29c865d092976f2695339a8e6152fa1f1db4fda.exe 28 PID 1896 wrote to memory of 2036 1896 9431b3a7e09d260d61fd0363e29c865d092976f2695339a8e6152fa1f1db4fda.exe 28 PID 2036 wrote to memory of 1236 2036 plugin.exe 29 PID 2036 wrote to memory of 1236 2036 plugin.exe 29 PID 2036 wrote to memory of 1236 2036 plugin.exe 29 PID 2036 wrote to memory of 1236 2036 plugin.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\9431b3a7e09d260d61fd0363e29c865d092976f2695339a8e6152fa1f1db4fda.exe"C:\Users\Admin\AppData\Local\Temp\9431b3a7e09d260d61fd0363e29c865d092976f2695339a8e6152fa1f1db4fda.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\ProgramData\UBlockPlugin\plugin.exeC:\ProgramData\UBlockPlugin\plugin.exe "C:\Users\Admin\AppData\Local\Temp\9431b3a7e09d260d61fd0363e29c865d092976f2695339a8e6152fa1f1db4fda.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Deletes itself
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\UBlockPlugin\plugin.exe3⤵PID:1236
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5329bd1008c63fa9abf81cd6afd7a6559
SHA1d07885a5899b13294672a3f396ec445dd8b09529
SHA2569431b3a7e09d260d61fd0363e29c865d092976f2695339a8e6152fa1f1db4fda
SHA512289f56d591ed7c542d0dec58a5d107713af35f2b50f1bb6ccc841c8114b833942d47c4c9da8061e750ccd1ab06649dfb4a039d6a658807c82a8e95b0afcaf78f
-
Filesize
1.8MB
MD5329bd1008c63fa9abf81cd6afd7a6559
SHA1d07885a5899b13294672a3f396ec445dd8b09529
SHA2569431b3a7e09d260d61fd0363e29c865d092976f2695339a8e6152fa1f1db4fda
SHA512289f56d591ed7c542d0dec58a5d107713af35f2b50f1bb6ccc841c8114b833942d47c4c9da8061e750ccd1ab06649dfb4a039d6a658807c82a8e95b0afcaf78f
-
Filesize
1.8MB
MD5329bd1008c63fa9abf81cd6afd7a6559
SHA1d07885a5899b13294672a3f396ec445dd8b09529
SHA2569431b3a7e09d260d61fd0363e29c865d092976f2695339a8e6152fa1f1db4fda
SHA512289f56d591ed7c542d0dec58a5d107713af35f2b50f1bb6ccc841c8114b833942d47c4c9da8061e750ccd1ab06649dfb4a039d6a658807c82a8e95b0afcaf78f
-
Filesize
1.8MB
MD5329bd1008c63fa9abf81cd6afd7a6559
SHA1d07885a5899b13294672a3f396ec445dd8b09529
SHA2569431b3a7e09d260d61fd0363e29c865d092976f2695339a8e6152fa1f1db4fda
SHA512289f56d591ed7c542d0dec58a5d107713af35f2b50f1bb6ccc841c8114b833942d47c4c9da8061e750ccd1ab06649dfb4a039d6a658807c82a8e95b0afcaf78f