Analysis
-
max time kernel
34s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
25-07-2022 02:18
Static task
static1
Behavioral task
behavioral1
Sample
a6d1d66c30c7b3a9b204bc7161b96983369a4e76e6511888814a5d2397bcbe5f.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
a6d1d66c30c7b3a9b204bc7161b96983369a4e76e6511888814a5d2397bcbe5f.exe
Resource
win10v2004-20220721-en
General
-
Target
a6d1d66c30c7b3a9b204bc7161b96983369a4e76e6511888814a5d2397bcbe5f.exe
-
Size
2.0MB
-
MD5
4fc7a093ce5048cf943b039ea39c1e60
-
SHA1
dc5d7f205723e37e55b90e725991222b503b963a
-
SHA256
a6d1d66c30c7b3a9b204bc7161b96983369a4e76e6511888814a5d2397bcbe5f
-
SHA512
5d33ea3bc56f778782d8580fb82a9ae85f0029ddf6bcfbeaca92b177a92fc8b2a3681abb39c1929ab7cb60b3f9c4d5206944fa1d8f31671675fd0d8ffb936498
Malware Config
Extracted
buer
http://loy01.top/
http://loy02.top/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\UBlockPlugin\\plugin.exe\"" plugin.exe -
resource yara_rule behavioral1/memory/1388-59-0x000000003F2E0000-0x000000003F7C9000-memory.dmp buer behavioral1/memory/1784-70-0x000000003F8E0000-0x000000003FDC9000-memory.dmp buer behavioral1/memory/1784-81-0x000000003F8E0000-0x000000003FDC9000-memory.dmp buer behavioral1/memory/1784-82-0x000000003F8E0000-0x000000003FDC9000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a6d1d66c30c7b3a9b204bc7161b96983369a4e76e6511888814a5d2397bcbe5f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ plugin.exe -
Executes dropped EXE 1 IoCs
pid Process 1784 plugin.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a6d1d66c30c7b3a9b204bc7161b96983369a4e76e6511888814a5d2397bcbe5f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a6d1d66c30c7b3a9b204bc7161b96983369a4e76e6511888814a5d2397bcbe5f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion plugin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion plugin.exe -
Deletes itself 1 IoCs
pid Process 1784 plugin.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Wine a6d1d66c30c7b3a9b204bc7161b96983369a4e76e6511888814a5d2397bcbe5f.exe Key opened \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Wine plugin.exe -
Loads dropped DLL 2 IoCs
pid Process 1388 a6d1d66c30c7b3a9b204bc7161b96983369a4e76e6511888814a5d2397bcbe5f.exe 1388 a6d1d66c30c7b3a9b204bc7161b96983369a4e76e6511888814a5d2397bcbe5f.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1388 a6d1d66c30c7b3a9b204bc7161b96983369a4e76e6511888814a5d2397bcbe5f.exe 1784 plugin.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1872 1880 WerFault.exe 29 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1388 a6d1d66c30c7b3a9b204bc7161b96983369a4e76e6511888814a5d2397bcbe5f.exe 1784 plugin.exe 1784 plugin.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1388 wrote to memory of 1784 1388 a6d1d66c30c7b3a9b204bc7161b96983369a4e76e6511888814a5d2397bcbe5f.exe 28 PID 1388 wrote to memory of 1784 1388 a6d1d66c30c7b3a9b204bc7161b96983369a4e76e6511888814a5d2397bcbe5f.exe 28 PID 1388 wrote to memory of 1784 1388 a6d1d66c30c7b3a9b204bc7161b96983369a4e76e6511888814a5d2397bcbe5f.exe 28 PID 1388 wrote to memory of 1784 1388 a6d1d66c30c7b3a9b204bc7161b96983369a4e76e6511888814a5d2397bcbe5f.exe 28 PID 1784 wrote to memory of 1880 1784 plugin.exe 29 PID 1784 wrote to memory of 1880 1784 plugin.exe 29 PID 1784 wrote to memory of 1880 1784 plugin.exe 29 PID 1784 wrote to memory of 1880 1784 plugin.exe 29 PID 1784 wrote to memory of 1880 1784 plugin.exe 29 PID 1784 wrote to memory of 1880 1784 plugin.exe 29 PID 1784 wrote to memory of 1880 1784 plugin.exe 29 PID 1784 wrote to memory of 1880 1784 plugin.exe 29 PID 1784 wrote to memory of 1880 1784 plugin.exe 29 PID 1784 wrote to memory of 1880 1784 plugin.exe 29 PID 1784 wrote to memory of 1880 1784 plugin.exe 29 PID 1784 wrote to memory of 1880 1784 plugin.exe 29 PID 1784 wrote to memory of 1880 1784 plugin.exe 29 PID 1880 wrote to memory of 1872 1880 secinit.exe 30 PID 1880 wrote to memory of 1872 1880 secinit.exe 30 PID 1880 wrote to memory of 1872 1880 secinit.exe 30 PID 1880 wrote to memory of 1872 1880 secinit.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6d1d66c30c7b3a9b204bc7161b96983369a4e76e6511888814a5d2397bcbe5f.exe"C:\Users\Admin\AppData\Local\Temp\a6d1d66c30c7b3a9b204bc7161b96983369a4e76e6511888814a5d2397bcbe5f.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\ProgramData\UBlockPlugin\plugin.exeC:\ProgramData\UBlockPlugin\plugin.exe "C:\Users\Admin\AppData\Local\Temp\a6d1d66c30c7b3a9b204bc7161b96983369a4e76e6511888814a5d2397bcbe5f.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Deletes itself
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\UBlockPlugin\plugin.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1880 -s 1364⤵
- Program crash
PID:1872
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD54fc7a093ce5048cf943b039ea39c1e60
SHA1dc5d7f205723e37e55b90e725991222b503b963a
SHA256a6d1d66c30c7b3a9b204bc7161b96983369a4e76e6511888814a5d2397bcbe5f
SHA5125d33ea3bc56f778782d8580fb82a9ae85f0029ddf6bcfbeaca92b177a92fc8b2a3681abb39c1929ab7cb60b3f9c4d5206944fa1d8f31671675fd0d8ffb936498
-
Filesize
2.0MB
MD54fc7a093ce5048cf943b039ea39c1e60
SHA1dc5d7f205723e37e55b90e725991222b503b963a
SHA256a6d1d66c30c7b3a9b204bc7161b96983369a4e76e6511888814a5d2397bcbe5f
SHA5125d33ea3bc56f778782d8580fb82a9ae85f0029ddf6bcfbeaca92b177a92fc8b2a3681abb39c1929ab7cb60b3f9c4d5206944fa1d8f31671675fd0d8ffb936498
-
Filesize
2.0MB
MD54fc7a093ce5048cf943b039ea39c1e60
SHA1dc5d7f205723e37e55b90e725991222b503b963a
SHA256a6d1d66c30c7b3a9b204bc7161b96983369a4e76e6511888814a5d2397bcbe5f
SHA5125d33ea3bc56f778782d8580fb82a9ae85f0029ddf6bcfbeaca92b177a92fc8b2a3681abb39c1929ab7cb60b3f9c4d5206944fa1d8f31671675fd0d8ffb936498
-
Filesize
2.0MB
MD54fc7a093ce5048cf943b039ea39c1e60
SHA1dc5d7f205723e37e55b90e725991222b503b963a
SHA256a6d1d66c30c7b3a9b204bc7161b96983369a4e76e6511888814a5d2397bcbe5f
SHA5125d33ea3bc56f778782d8580fb82a9ae85f0029ddf6bcfbeaca92b177a92fc8b2a3681abb39c1929ab7cb60b3f9c4d5206944fa1d8f31671675fd0d8ffb936498