Analysis
-
max time kernel
43s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
24-07-2022 17:11
Static task
static1
Behavioral task
behavioral1
Sample
f2df4c45300e982fc3c0131ad426ea3b55d28e983ec3221f243f4c496ca618b1.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
f2df4c45300e982fc3c0131ad426ea3b55d28e983ec3221f243f4c496ca618b1.exe
Resource
win10v2004-20220721-en
General
-
Target
f2df4c45300e982fc3c0131ad426ea3b55d28e983ec3221f243f4c496ca618b1.exe
-
Size
1.8MB
-
MD5
5fcc7f613eb5fe47512efb5c67830712
-
SHA1
0db872d896a9991aa6703cb0d7d7960fa8c2a0e8
-
SHA256
f2df4c45300e982fc3c0131ad426ea3b55d28e983ec3221f243f4c496ca618b1
-
SHA512
a5d4133fe3b8f13dc02eb319403021834ed63595331a8530d0775bc1a6c83a80983fa7a5cf548a47c058263cc8a1a5c0a719df55b9becafa296c1cd95f39a5e2
Malware Config
Extracted
buer
http://loy01.top/
http://loy02.top/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\UBlockPlugin\\plugin.exe\"" plugin.exe -
resource yara_rule behavioral1/memory/1900-59-0x000000003FA80000-0x000000003FF08000-memory.dmp buer behavioral1/memory/1772-64-0x000000003FF10000-0x0000000040398000-memory.dmp buer behavioral1/memory/1772-66-0x000000003FF10000-0x0000000040398000-memory.dmp buer behavioral1/memory/1772-67-0x000000003FF10000-0x0000000040398000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ plugin.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f2df4c45300e982fc3c0131ad426ea3b55d28e983ec3221f243f4c496ca618b1.exe -
Executes dropped EXE 1 IoCs
pid Process 1772 plugin.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f2df4c45300e982fc3c0131ad426ea3b55d28e983ec3221f243f4c496ca618b1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f2df4c45300e982fc3c0131ad426ea3b55d28e983ec3221f243f4c496ca618b1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion plugin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion plugin.exe -
Deletes itself 1 IoCs
pid Process 1772 plugin.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Wine f2df4c45300e982fc3c0131ad426ea3b55d28e983ec3221f243f4c496ca618b1.exe Key opened \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Wine plugin.exe -
Loads dropped DLL 2 IoCs
pid Process 1900 f2df4c45300e982fc3c0131ad426ea3b55d28e983ec3221f243f4c496ca618b1.exe 1900 f2df4c45300e982fc3c0131ad426ea3b55d28e983ec3221f243f4c496ca618b1.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1900 f2df4c45300e982fc3c0131ad426ea3b55d28e983ec3221f243f4c496ca618b1.exe 1772 plugin.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1900 f2df4c45300e982fc3c0131ad426ea3b55d28e983ec3221f243f4c496ca618b1.exe 1772 plugin.exe 1772 plugin.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1900 wrote to memory of 1772 1900 f2df4c45300e982fc3c0131ad426ea3b55d28e983ec3221f243f4c496ca618b1.exe 27 PID 1900 wrote to memory of 1772 1900 f2df4c45300e982fc3c0131ad426ea3b55d28e983ec3221f243f4c496ca618b1.exe 27 PID 1900 wrote to memory of 1772 1900 f2df4c45300e982fc3c0131ad426ea3b55d28e983ec3221f243f4c496ca618b1.exe 27 PID 1900 wrote to memory of 1772 1900 f2df4c45300e982fc3c0131ad426ea3b55d28e983ec3221f243f4c496ca618b1.exe 27 PID 1772 wrote to memory of 640 1772 plugin.exe 28 PID 1772 wrote to memory of 640 1772 plugin.exe 28 PID 1772 wrote to memory of 640 1772 plugin.exe 28 PID 1772 wrote to memory of 640 1772 plugin.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2df4c45300e982fc3c0131ad426ea3b55d28e983ec3221f243f4c496ca618b1.exe"C:\Users\Admin\AppData\Local\Temp\f2df4c45300e982fc3c0131ad426ea3b55d28e983ec3221f243f4c496ca618b1.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\ProgramData\UBlockPlugin\plugin.exeC:\ProgramData\UBlockPlugin\plugin.exe "C:\Users\Admin\AppData\Local\Temp\f2df4c45300e982fc3c0131ad426ea3b55d28e983ec3221f243f4c496ca618b1.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Deletes itself
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\UBlockPlugin\plugin.exe3⤵PID:640
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD55fcc7f613eb5fe47512efb5c67830712
SHA10db872d896a9991aa6703cb0d7d7960fa8c2a0e8
SHA256f2df4c45300e982fc3c0131ad426ea3b55d28e983ec3221f243f4c496ca618b1
SHA512a5d4133fe3b8f13dc02eb319403021834ed63595331a8530d0775bc1a6c83a80983fa7a5cf548a47c058263cc8a1a5c0a719df55b9becafa296c1cd95f39a5e2
-
Filesize
1.8MB
MD55fcc7f613eb5fe47512efb5c67830712
SHA10db872d896a9991aa6703cb0d7d7960fa8c2a0e8
SHA256f2df4c45300e982fc3c0131ad426ea3b55d28e983ec3221f243f4c496ca618b1
SHA512a5d4133fe3b8f13dc02eb319403021834ed63595331a8530d0775bc1a6c83a80983fa7a5cf548a47c058263cc8a1a5c0a719df55b9becafa296c1cd95f39a5e2
-
Filesize
1.8MB
MD55fcc7f613eb5fe47512efb5c67830712
SHA10db872d896a9991aa6703cb0d7d7960fa8c2a0e8
SHA256f2df4c45300e982fc3c0131ad426ea3b55d28e983ec3221f243f4c496ca618b1
SHA512a5d4133fe3b8f13dc02eb319403021834ed63595331a8530d0775bc1a6c83a80983fa7a5cf548a47c058263cc8a1a5c0a719df55b9becafa296c1cd95f39a5e2
-
Filesize
1.8MB
MD55fcc7f613eb5fe47512efb5c67830712
SHA10db872d896a9991aa6703cb0d7d7960fa8c2a0e8
SHA256f2df4c45300e982fc3c0131ad426ea3b55d28e983ec3221f243f4c496ca618b1
SHA512a5d4133fe3b8f13dc02eb319403021834ed63595331a8530d0775bc1a6c83a80983fa7a5cf548a47c058263cc8a1a5c0a719df55b9becafa296c1cd95f39a5e2