Analysis
-
max time kernel
125s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
24-07-2022 17:22
Static task
static1
Behavioral task
behavioral1
Sample
ca8f4594a6800a308c5cbc8c6325e958e42dd4cf539ad4e01362dcc1ec20142b.exe
Resource
win7-20220715-en
General
-
Target
ca8f4594a6800a308c5cbc8c6325e958e42dd4cf539ad4e01362dcc1ec20142b.exe
-
Size
1.5MB
-
MD5
6943e6fa21cf64f70bccdf137160b9ca
-
SHA1
e0d5fe545d1d17dd1e06f21b6767fb2a20df2e86
-
SHA256
ca8f4594a6800a308c5cbc8c6325e958e42dd4cf539ad4e01362dcc1ec20142b
-
SHA512
6e83cb6001bcca7f7376f80e215671a0210e8fc5670a28d7b8373b02d831d3c7b4adaab85b5596d5d7ebe89fce2f75975d6e9a5446f0cf05d0c6d2c50b50d99a
Malware Config
Extracted
buer
https://loddd01.info/
https://loddd02.info/
Signatures
-
resource yara_rule behavioral2/memory/2972-132-0x000000003FDC0000-0x00000000401A6000-memory.dmp buer behavioral2/memory/2972-133-0x000000003FDC0000-0x00000000401A6000-memory.dmp buer behavioral2/memory/2972-134-0x000000003FDC0000-0x00000000401A6000-memory.dmp buer behavioral2/memory/2972-139-0x000000003FDC0000-0x00000000401A6000-memory.dmp buer behavioral2/memory/4528-142-0x000000003FCB0000-0x0000000040096000-memory.dmp buer behavioral2/memory/4528-143-0x000000003FCB0000-0x0000000040096000-memory.dmp buer behavioral2/memory/4528-144-0x000000003FCB0000-0x0000000040096000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ca8f4594a6800a308c5cbc8c6325e958e42dd4cf539ad4e01362dcc1ec20142b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ plugin.exe -
Executes dropped EXE 1 IoCs
pid Process 4528 plugin.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ca8f4594a6800a308c5cbc8c6325e958e42dd4cf539ad4e01362dcc1ec20142b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ca8f4594a6800a308c5cbc8c6325e958e42dd4cf539ad4e01362dcc1ec20142b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion plugin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion plugin.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Software\Wine plugin.exe Key opened \REGISTRY\USER\S-1-5-21-1101907861-274115917-2188613224-1000\Software\Wine ca8f4594a6800a308c5cbc8c6325e958e42dd4cf539ad4e01362dcc1ec20142b.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2972 ca8f4594a6800a308c5cbc8c6325e958e42dd4cf539ad4e01362dcc1ec20142b.exe 4528 plugin.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3892 3968 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2972 ca8f4594a6800a308c5cbc8c6325e958e42dd4cf539ad4e01362dcc1ec20142b.exe 2972 ca8f4594a6800a308c5cbc8c6325e958e42dd4cf539ad4e01362dcc1ec20142b.exe 4528 plugin.exe 4528 plugin.exe 4528 plugin.exe 4528 plugin.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2972 wrote to memory of 4528 2972 ca8f4594a6800a308c5cbc8c6325e958e42dd4cf539ad4e01362dcc1ec20142b.exe 82 PID 2972 wrote to memory of 4528 2972 ca8f4594a6800a308c5cbc8c6325e958e42dd4cf539ad4e01362dcc1ec20142b.exe 82 PID 2972 wrote to memory of 4528 2972 ca8f4594a6800a308c5cbc8c6325e958e42dd4cf539ad4e01362dcc1ec20142b.exe 82 PID 4528 wrote to memory of 3968 4528 plugin.exe 83 PID 4528 wrote to memory of 3968 4528 plugin.exe 83 PID 4528 wrote to memory of 3968 4528 plugin.exe 83 PID 4528 wrote to memory of 3968 4528 plugin.exe 83 PID 4528 wrote to memory of 3968 4528 plugin.exe 83 PID 4528 wrote to memory of 3968 4528 plugin.exe 83 PID 4528 wrote to memory of 3968 4528 plugin.exe 83 PID 4528 wrote to memory of 3968 4528 plugin.exe 83 PID 4528 wrote to memory of 3968 4528 plugin.exe 83 PID 4528 wrote to memory of 3968 4528 plugin.exe 83 PID 4528 wrote to memory of 3968 4528 plugin.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca8f4594a6800a308c5cbc8c6325e958e42dd4cf539ad4e01362dcc1ec20142b.exe"C:\Users\Admin\AppData\Local\Temp\ca8f4594a6800a308c5cbc8c6325e958e42dd4cf539ad4e01362dcc1ec20142b.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\ProgramData\UBlockPlugin\plugin.exeC:\ProgramData\UBlockPlugin\plugin.exe "C:\Users\Admin\AppData\Local\Temp\ca8f4594a6800a308c5cbc8c6325e958e42dd4cf539ad4e01362dcc1ec20142b.exe" ensgJJ2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\UBlockPlugin\plugin.exe3⤵PID:3968
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3968 -s 1764⤵
- Program crash
PID:3892
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3968 -ip 39681⤵PID:3248
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD56943e6fa21cf64f70bccdf137160b9ca
SHA1e0d5fe545d1d17dd1e06f21b6767fb2a20df2e86
SHA256ca8f4594a6800a308c5cbc8c6325e958e42dd4cf539ad4e01362dcc1ec20142b
SHA5126e83cb6001bcca7f7376f80e215671a0210e8fc5670a28d7b8373b02d831d3c7b4adaab85b5596d5d7ebe89fce2f75975d6e9a5446f0cf05d0c6d2c50b50d99a
-
Filesize
1.5MB
MD56943e6fa21cf64f70bccdf137160b9ca
SHA1e0d5fe545d1d17dd1e06f21b6767fb2a20df2e86
SHA256ca8f4594a6800a308c5cbc8c6325e958e42dd4cf539ad4e01362dcc1ec20142b
SHA5126e83cb6001bcca7f7376f80e215671a0210e8fc5670a28d7b8373b02d831d3c7b4adaab85b5596d5d7ebe89fce2f75975d6e9a5446f0cf05d0c6d2c50b50d99a