Analysis
-
max time kernel
41s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
24-07-2022 17:21
Static task
static1
Behavioral task
behavioral1
Sample
d1d93897a3378eb32b943ef3010f9af53246cb90e125668d080a28ec676b332f.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
d1d93897a3378eb32b943ef3010f9af53246cb90e125668d080a28ec676b332f.exe
Resource
win10v2004-20220721-en
General
-
Target
d1d93897a3378eb32b943ef3010f9af53246cb90e125668d080a28ec676b332f.exe
-
Size
2.0MB
-
MD5
e841f039dd3583e617ffe376df63b87c
-
SHA1
d8d998f26b3b73a0631824d1336a25f6f14b7e84
-
SHA256
d1d93897a3378eb32b943ef3010f9af53246cb90e125668d080a28ec676b332f
-
SHA512
7b9e80d8d0c614476f81a1cdfa4a341e39e25dc75708a6c18c695e27afe965eb931055e9cd66d730d53e5a9d0665c5d0f2ed0e438f6c1b03190608a6de2f6380
Malware Config
Extracted
buer
http://loy01.top/
http://loy02.top/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\UBlockPlugin\\plugin.exe\"" plugin.exe -
resource yara_rule behavioral1/memory/880-59-0x000000003F130000-0x000000003F613000-memory.dmp buer behavioral1/memory/1272-64-0x000000003FF90000-0x0000000040473000-memory.dmp buer behavioral1/memory/1272-69-0x000000003FF90000-0x0000000040473000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d1d93897a3378eb32b943ef3010f9af53246cb90e125668d080a28ec676b332f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ plugin.exe -
Executes dropped EXE 1 IoCs
pid Process 1272 plugin.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d1d93897a3378eb32b943ef3010f9af53246cb90e125668d080a28ec676b332f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d1d93897a3378eb32b943ef3010f9af53246cb90e125668d080a28ec676b332f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion plugin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion plugin.exe -
Deletes itself 1 IoCs
pid Process 1272 plugin.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Wine d1d93897a3378eb32b943ef3010f9af53246cb90e125668d080a28ec676b332f.exe Key opened \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Wine plugin.exe -
Loads dropped DLL 5 IoCs
pid Process 880 d1d93897a3378eb32b943ef3010f9af53246cb90e125668d080a28ec676b332f.exe 880 d1d93897a3378eb32b943ef3010f9af53246cb90e125668d080a28ec676b332f.exe 564 WerFault.exe 564 WerFault.exe 564 WerFault.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 880 d1d93897a3378eb32b943ef3010f9af53246cb90e125668d080a28ec676b332f.exe 1272 plugin.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 564 1272 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 880 d1d93897a3378eb32b943ef3010f9af53246cb90e125668d080a28ec676b332f.exe 1272 plugin.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 880 wrote to memory of 1272 880 d1d93897a3378eb32b943ef3010f9af53246cb90e125668d080a28ec676b332f.exe 28 PID 880 wrote to memory of 1272 880 d1d93897a3378eb32b943ef3010f9af53246cb90e125668d080a28ec676b332f.exe 28 PID 880 wrote to memory of 1272 880 d1d93897a3378eb32b943ef3010f9af53246cb90e125668d080a28ec676b332f.exe 28 PID 880 wrote to memory of 1272 880 d1d93897a3378eb32b943ef3010f9af53246cb90e125668d080a28ec676b332f.exe 28 PID 1272 wrote to memory of 824 1272 plugin.exe 29 PID 1272 wrote to memory of 824 1272 plugin.exe 29 PID 1272 wrote to memory of 824 1272 plugin.exe 29 PID 1272 wrote to memory of 824 1272 plugin.exe 29 PID 1272 wrote to memory of 564 1272 plugin.exe 30 PID 1272 wrote to memory of 564 1272 plugin.exe 30 PID 1272 wrote to memory of 564 1272 plugin.exe 30 PID 1272 wrote to memory of 564 1272 plugin.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1d93897a3378eb32b943ef3010f9af53246cb90e125668d080a28ec676b332f.exe"C:\Users\Admin\AppData\Local\Temp\d1d93897a3378eb32b943ef3010f9af53246cb90e125668d080a28ec676b332f.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:880 -
C:\ProgramData\UBlockPlugin\plugin.exeC:\ProgramData\UBlockPlugin\plugin.exe "C:\Users\Admin\AppData\Local\Temp\d1d93897a3378eb32b943ef3010f9af53246cb90e125668d080a28ec676b332f.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Deletes itself
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\UBlockPlugin\plugin.exe3⤵PID:824
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1272 -s 3603⤵
- Loads dropped DLL
- Program crash
PID:564
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5e841f039dd3583e617ffe376df63b87c
SHA1d8d998f26b3b73a0631824d1336a25f6f14b7e84
SHA256d1d93897a3378eb32b943ef3010f9af53246cb90e125668d080a28ec676b332f
SHA5127b9e80d8d0c614476f81a1cdfa4a341e39e25dc75708a6c18c695e27afe965eb931055e9cd66d730d53e5a9d0665c5d0f2ed0e438f6c1b03190608a6de2f6380
-
Filesize
2.0MB
MD5e841f039dd3583e617ffe376df63b87c
SHA1d8d998f26b3b73a0631824d1336a25f6f14b7e84
SHA256d1d93897a3378eb32b943ef3010f9af53246cb90e125668d080a28ec676b332f
SHA5127b9e80d8d0c614476f81a1cdfa4a341e39e25dc75708a6c18c695e27afe965eb931055e9cd66d730d53e5a9d0665c5d0f2ed0e438f6c1b03190608a6de2f6380
-
Filesize
2.0MB
MD5e841f039dd3583e617ffe376df63b87c
SHA1d8d998f26b3b73a0631824d1336a25f6f14b7e84
SHA256d1d93897a3378eb32b943ef3010f9af53246cb90e125668d080a28ec676b332f
SHA5127b9e80d8d0c614476f81a1cdfa4a341e39e25dc75708a6c18c695e27afe965eb931055e9cd66d730d53e5a9d0665c5d0f2ed0e438f6c1b03190608a6de2f6380
-
Filesize
2.0MB
MD5e841f039dd3583e617ffe376df63b87c
SHA1d8d998f26b3b73a0631824d1336a25f6f14b7e84
SHA256d1d93897a3378eb32b943ef3010f9af53246cb90e125668d080a28ec676b332f
SHA5127b9e80d8d0c614476f81a1cdfa4a341e39e25dc75708a6c18c695e27afe965eb931055e9cd66d730d53e5a9d0665c5d0f2ed0e438f6c1b03190608a6de2f6380
-
Filesize
2.0MB
MD5e841f039dd3583e617ffe376df63b87c
SHA1d8d998f26b3b73a0631824d1336a25f6f14b7e84
SHA256d1d93897a3378eb32b943ef3010f9af53246cb90e125668d080a28ec676b332f
SHA5127b9e80d8d0c614476f81a1cdfa4a341e39e25dc75708a6c18c695e27afe965eb931055e9cd66d730d53e5a9d0665c5d0f2ed0e438f6c1b03190608a6de2f6380
-
Filesize
2.0MB
MD5e841f039dd3583e617ffe376df63b87c
SHA1d8d998f26b3b73a0631824d1336a25f6f14b7e84
SHA256d1d93897a3378eb32b943ef3010f9af53246cb90e125668d080a28ec676b332f
SHA5127b9e80d8d0c614476f81a1cdfa4a341e39e25dc75708a6c18c695e27afe965eb931055e9cd66d730d53e5a9d0665c5d0f2ed0e438f6c1b03190608a6de2f6380