Analysis
-
max time kernel
44s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
24-07-2022 17:11
Static task
static1
Behavioral task
behavioral1
Sample
f496e1cd3b7c86e1d1f3e5ae4ede6e64c7e44e127499ba9384eb57a3191c32b8.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
f496e1cd3b7c86e1d1f3e5ae4ede6e64c7e44e127499ba9384eb57a3191c32b8.exe
Resource
win10v2004-20220721-en
General
-
Target
f496e1cd3b7c86e1d1f3e5ae4ede6e64c7e44e127499ba9384eb57a3191c32b8.exe
-
Size
2.0MB
-
MD5
d3d83d82b0fc9300b736cbe55fb82445
-
SHA1
b4690a316a6469738f4d38445b37b34a0e686742
-
SHA256
f496e1cd3b7c86e1d1f3e5ae4ede6e64c7e44e127499ba9384eb57a3191c32b8
-
SHA512
19c82cd3114ebb420d07d0926aafbb482a450cc2b31b50cdd3cac23a4a45f16686f893610ba4bc942ef902c9478afa13ee5b91e935ced9ee92141a41cfea4942
Malware Config
Extracted
buer
http://loy01.top/
http://loy02.top/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\UBlockPlugin\\plugin.exe\"" plugin.exe -
resource yara_rule behavioral1/memory/1800-60-0x000000003F290000-0x000000003F771000-memory.dmp buer behavioral1/memory/2012-63-0x000000003FFC0000-0x00000000404A1000-memory.dmp buer behavioral1/memory/2012-65-0x000000003FFC0000-0x00000000404A1000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ plugin.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f496e1cd3b7c86e1d1f3e5ae4ede6e64c7e44e127499ba9384eb57a3191c32b8.exe -
Executes dropped EXE 1 IoCs
pid Process 2012 plugin.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f496e1cd3b7c86e1d1f3e5ae4ede6e64c7e44e127499ba9384eb57a3191c32b8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f496e1cd3b7c86e1d1f3e5ae4ede6e64c7e44e127499ba9384eb57a3191c32b8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion plugin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion plugin.exe -
Deletes itself 1 IoCs
pid Process 2012 plugin.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Wine f496e1cd3b7c86e1d1f3e5ae4ede6e64c7e44e127499ba9384eb57a3191c32b8.exe Key opened \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Wine plugin.exe -
Loads dropped DLL 2 IoCs
pid Process 1800 f496e1cd3b7c86e1d1f3e5ae4ede6e64c7e44e127499ba9384eb57a3191c32b8.exe 1800 f496e1cd3b7c86e1d1f3e5ae4ede6e64c7e44e127499ba9384eb57a3191c32b8.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1800 f496e1cd3b7c86e1d1f3e5ae4ede6e64c7e44e127499ba9384eb57a3191c32b8.exe 2012 plugin.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1800 f496e1cd3b7c86e1d1f3e5ae4ede6e64c7e44e127499ba9384eb57a3191c32b8.exe 2012 plugin.exe 2012 plugin.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1800 wrote to memory of 2012 1800 f496e1cd3b7c86e1d1f3e5ae4ede6e64c7e44e127499ba9384eb57a3191c32b8.exe 27 PID 1800 wrote to memory of 2012 1800 f496e1cd3b7c86e1d1f3e5ae4ede6e64c7e44e127499ba9384eb57a3191c32b8.exe 27 PID 1800 wrote to memory of 2012 1800 f496e1cd3b7c86e1d1f3e5ae4ede6e64c7e44e127499ba9384eb57a3191c32b8.exe 27 PID 1800 wrote to memory of 2012 1800 f496e1cd3b7c86e1d1f3e5ae4ede6e64c7e44e127499ba9384eb57a3191c32b8.exe 27 PID 2012 wrote to memory of 568 2012 plugin.exe 28 PID 2012 wrote to memory of 568 2012 plugin.exe 28 PID 2012 wrote to memory of 568 2012 plugin.exe 28 PID 2012 wrote to memory of 568 2012 plugin.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f496e1cd3b7c86e1d1f3e5ae4ede6e64c7e44e127499ba9384eb57a3191c32b8.exe"C:\Users\Admin\AppData\Local\Temp\f496e1cd3b7c86e1d1f3e5ae4ede6e64c7e44e127499ba9384eb57a3191c32b8.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\ProgramData\UBlockPlugin\plugin.exeC:\ProgramData\UBlockPlugin\plugin.exe "C:\Users\Admin\AppData\Local\Temp\f496e1cd3b7c86e1d1f3e5ae4ede6e64c7e44e127499ba9384eb57a3191c32b8.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Deletes itself
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\UBlockPlugin\plugin.exe3⤵PID:568
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5d3d83d82b0fc9300b736cbe55fb82445
SHA1b4690a316a6469738f4d38445b37b34a0e686742
SHA256f496e1cd3b7c86e1d1f3e5ae4ede6e64c7e44e127499ba9384eb57a3191c32b8
SHA51219c82cd3114ebb420d07d0926aafbb482a450cc2b31b50cdd3cac23a4a45f16686f893610ba4bc942ef902c9478afa13ee5b91e935ced9ee92141a41cfea4942
-
Filesize
2.0MB
MD5d3d83d82b0fc9300b736cbe55fb82445
SHA1b4690a316a6469738f4d38445b37b34a0e686742
SHA256f496e1cd3b7c86e1d1f3e5ae4ede6e64c7e44e127499ba9384eb57a3191c32b8
SHA51219c82cd3114ebb420d07d0926aafbb482a450cc2b31b50cdd3cac23a4a45f16686f893610ba4bc942ef902c9478afa13ee5b91e935ced9ee92141a41cfea4942
-
Filesize
2.0MB
MD5d3d83d82b0fc9300b736cbe55fb82445
SHA1b4690a316a6469738f4d38445b37b34a0e686742
SHA256f496e1cd3b7c86e1d1f3e5ae4ede6e64c7e44e127499ba9384eb57a3191c32b8
SHA51219c82cd3114ebb420d07d0926aafbb482a450cc2b31b50cdd3cac23a4a45f16686f893610ba4bc942ef902c9478afa13ee5b91e935ced9ee92141a41cfea4942
-
Filesize
2.0MB
MD5d3d83d82b0fc9300b736cbe55fb82445
SHA1b4690a316a6469738f4d38445b37b34a0e686742
SHA256f496e1cd3b7c86e1d1f3e5ae4ede6e64c7e44e127499ba9384eb57a3191c32b8
SHA51219c82cd3114ebb420d07d0926aafbb482a450cc2b31b50cdd3cac23a4a45f16686f893610ba4bc942ef902c9478afa13ee5b91e935ced9ee92141a41cfea4942