Analysis
-
max time kernel
104s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2022 02:18
Static task
static1
Behavioral task
behavioral1
Sample
a6d1d66c30c7b3a9b204bc7161b96983369a4e76e6511888814a5d2397bcbe5f.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
a6d1d66c30c7b3a9b204bc7161b96983369a4e76e6511888814a5d2397bcbe5f.exe
Resource
win10v2004-20220721-en
General
-
Target
a6d1d66c30c7b3a9b204bc7161b96983369a4e76e6511888814a5d2397bcbe5f.exe
-
Size
2.0MB
-
MD5
4fc7a093ce5048cf943b039ea39c1e60
-
SHA1
dc5d7f205723e37e55b90e725991222b503b963a
-
SHA256
a6d1d66c30c7b3a9b204bc7161b96983369a4e76e6511888814a5d2397bcbe5f
-
SHA512
5d33ea3bc56f778782d8580fb82a9ae85f0029ddf6bcfbeaca92b177a92fc8b2a3681abb39c1929ab7cb60b3f9c4d5206944fa1d8f31671675fd0d8ffb936498
Malware Config
Extracted
buer
http://loy01.top/
http://loy02.top/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\UBlockPlugin\\plugin.exe\"" plugin.exe -
resource yara_rule behavioral2/memory/968-132-0x000000003F080000-0x000000003F569000-memory.dmp buer behavioral2/memory/968-136-0x000000003F080000-0x000000003F569000-memory.dmp buer behavioral2/memory/1188-140-0x000000003F130000-0x000000003F619000-memory.dmp buer behavioral2/memory/1188-142-0x000000003F130000-0x000000003F619000-memory.dmp buer behavioral2/memory/1188-144-0x000000003F130000-0x000000003F619000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a6d1d66c30c7b3a9b204bc7161b96983369a4e76e6511888814a5d2397bcbe5f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ plugin.exe -
Executes dropped EXE 1 IoCs
pid Process 1188 plugin.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a6d1d66c30c7b3a9b204bc7161b96983369a4e76e6511888814a5d2397bcbe5f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a6d1d66c30c7b3a9b204bc7161b96983369a4e76e6511888814a5d2397bcbe5f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion plugin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion plugin.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Software\Wine a6d1d66c30c7b3a9b204bc7161b96983369a4e76e6511888814a5d2397bcbe5f.exe Key opened \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Software\Wine plugin.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 968 a6d1d66c30c7b3a9b204bc7161b96983369a4e76e6511888814a5d2397bcbe5f.exe 1188 plugin.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3680 392 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 968 a6d1d66c30c7b3a9b204bc7161b96983369a4e76e6511888814a5d2397bcbe5f.exe 968 a6d1d66c30c7b3a9b204bc7161b96983369a4e76e6511888814a5d2397bcbe5f.exe 1188 plugin.exe 1188 plugin.exe 1188 plugin.exe 1188 plugin.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 968 wrote to memory of 1188 968 a6d1d66c30c7b3a9b204bc7161b96983369a4e76e6511888814a5d2397bcbe5f.exe 82 PID 968 wrote to memory of 1188 968 a6d1d66c30c7b3a9b204bc7161b96983369a4e76e6511888814a5d2397bcbe5f.exe 82 PID 968 wrote to memory of 1188 968 a6d1d66c30c7b3a9b204bc7161b96983369a4e76e6511888814a5d2397bcbe5f.exe 82 PID 1188 wrote to memory of 392 1188 plugin.exe 83 PID 1188 wrote to memory of 392 1188 plugin.exe 83 PID 1188 wrote to memory of 392 1188 plugin.exe 83 PID 1188 wrote to memory of 392 1188 plugin.exe 83 PID 1188 wrote to memory of 392 1188 plugin.exe 83 PID 1188 wrote to memory of 392 1188 plugin.exe 83 PID 1188 wrote to memory of 392 1188 plugin.exe 83 PID 1188 wrote to memory of 392 1188 plugin.exe 83 PID 1188 wrote to memory of 392 1188 plugin.exe 83 PID 1188 wrote to memory of 392 1188 plugin.exe 83 PID 1188 wrote to memory of 392 1188 plugin.exe 83 PID 1188 wrote to memory of 392 1188 plugin.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6d1d66c30c7b3a9b204bc7161b96983369a4e76e6511888814a5d2397bcbe5f.exe"C:\Users\Admin\AppData\Local\Temp\a6d1d66c30c7b3a9b204bc7161b96983369a4e76e6511888814a5d2397bcbe5f.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:968 -
C:\ProgramData\UBlockPlugin\plugin.exeC:\ProgramData\UBlockPlugin\plugin.exe "C:\Users\Admin\AppData\Local\Temp\a6d1d66c30c7b3a9b204bc7161b96983369a4e76e6511888814a5d2397bcbe5f.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\UBlockPlugin\plugin.exe3⤵PID:392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 392 -s 2204⤵
- Program crash
PID:3680
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 392 -ip 3921⤵PID:900
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD54fc7a093ce5048cf943b039ea39c1e60
SHA1dc5d7f205723e37e55b90e725991222b503b963a
SHA256a6d1d66c30c7b3a9b204bc7161b96983369a4e76e6511888814a5d2397bcbe5f
SHA5125d33ea3bc56f778782d8580fb82a9ae85f0029ddf6bcfbeaca92b177a92fc8b2a3681abb39c1929ab7cb60b3f9c4d5206944fa1d8f31671675fd0d8ffb936498
-
Filesize
2.0MB
MD54fc7a093ce5048cf943b039ea39c1e60
SHA1dc5d7f205723e37e55b90e725991222b503b963a
SHA256a6d1d66c30c7b3a9b204bc7161b96983369a4e76e6511888814a5d2397bcbe5f
SHA5125d33ea3bc56f778782d8580fb82a9ae85f0029ddf6bcfbeaca92b177a92fc8b2a3681abb39c1929ab7cb60b3f9c4d5206944fa1d8f31671675fd0d8ffb936498