Analysis
-
max time kernel
128s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220722-en -
resource tags
arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2022 03:36
Static task
static1
Behavioral task
behavioral1
Sample
fb07db551c31c17ef048f04628cb49f400cf3b5d671b90c3334326755e709afa.exe
Resource
win7-20220718-en
General
-
Target
fb07db551c31c17ef048f04628cb49f400cf3b5d671b90c3334326755e709afa.exe
-
Size
1.4MB
-
MD5
652ab99bb0d38c2b096919ad9827cca6
-
SHA1
9604c9fb9c777f70c4911f575180da9db090ca0e
-
SHA256
fb07db551c31c17ef048f04628cb49f400cf3b5d671b90c3334326755e709afa
-
SHA512
b8f7ab53ce6360665158d4a8944483bfdcf2c7baf7e03bbd5cc53944e8b3cafdf8eacf105e5851f1cf3a200fadfe52ee24230d08ffacbd9ac74be0e76d005c9d
Malware Config
Extracted
buer
https://loddd01.info/
https://loddd02.info/
Signatures
-
resource yara_rule behavioral2/memory/4952-135-0x000000003F4F0000-0x000000003F8C6000-memory.dmp buer behavioral2/memory/4952-136-0x000000003F4F0000-0x000000003F8C6000-memory.dmp buer behavioral2/memory/4952-140-0x000000003F4F0000-0x000000003F8C6000-memory.dmp buer behavioral2/memory/2404-144-0x000000003FCF0000-0x00000000400C6000-memory.dmp buer behavioral2/memory/2404-145-0x000000003FCF0000-0x00000000400C6000-memory.dmp buer behavioral2/memory/2404-146-0x000000003FCF0000-0x00000000400C6000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ plugin.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fb07db551c31c17ef048f04628cb49f400cf3b5d671b90c3334326755e709afa.exe -
Executes dropped EXE 1 IoCs
pid Process 2404 plugin.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fb07db551c31c17ef048f04628cb49f400cf3b5d671b90c3334326755e709afa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fb07db551c31c17ef048f04628cb49f400cf3b5d671b90c3334326755e709afa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion plugin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion plugin.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\Software\Wine fb07db551c31c17ef048f04628cb49f400cf3b5d671b90c3334326755e709afa.exe Key opened \REGISTRY\USER\S-1-5-21-3463845317-933582289-45817732-1000\Software\Wine plugin.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4952 fb07db551c31c17ef048f04628cb49f400cf3b5d671b90c3334326755e709afa.exe 2404 plugin.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4588 5056 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4952 fb07db551c31c17ef048f04628cb49f400cf3b5d671b90c3334326755e709afa.exe 4952 fb07db551c31c17ef048f04628cb49f400cf3b5d671b90c3334326755e709afa.exe 2404 plugin.exe 2404 plugin.exe 2404 plugin.exe 2404 plugin.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4952 wrote to memory of 2404 4952 fb07db551c31c17ef048f04628cb49f400cf3b5d671b90c3334326755e709afa.exe 82 PID 4952 wrote to memory of 2404 4952 fb07db551c31c17ef048f04628cb49f400cf3b5d671b90c3334326755e709afa.exe 82 PID 4952 wrote to memory of 2404 4952 fb07db551c31c17ef048f04628cb49f400cf3b5d671b90c3334326755e709afa.exe 82 PID 2404 wrote to memory of 5056 2404 plugin.exe 83 PID 2404 wrote to memory of 5056 2404 plugin.exe 83 PID 2404 wrote to memory of 5056 2404 plugin.exe 83 PID 2404 wrote to memory of 5056 2404 plugin.exe 83 PID 2404 wrote to memory of 5056 2404 plugin.exe 83 PID 2404 wrote to memory of 5056 2404 plugin.exe 83 PID 2404 wrote to memory of 5056 2404 plugin.exe 83 PID 2404 wrote to memory of 5056 2404 plugin.exe 83 PID 2404 wrote to memory of 5056 2404 plugin.exe 83 PID 2404 wrote to memory of 5056 2404 plugin.exe 83 PID 2404 wrote to memory of 5056 2404 plugin.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb07db551c31c17ef048f04628cb49f400cf3b5d671b90c3334326755e709afa.exe"C:\Users\Admin\AppData\Local\Temp\fb07db551c31c17ef048f04628cb49f400cf3b5d671b90c3334326755e709afa.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\ProgramData\UBlockPlugin\plugin.exeC:\ProgramData\UBlockPlugin\plugin.exe "C:\Users\Admin\AppData\Local\Temp\fb07db551c31c17ef048f04628cb49f400cf3b5d671b90c3334326755e709afa.exe" ensgJJ2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\UBlockPlugin\plugin.exe3⤵PID:5056
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 2204⤵
- Program crash
PID:4588
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5056 -ip 50561⤵PID:2660
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5652ab99bb0d38c2b096919ad9827cca6
SHA19604c9fb9c777f70c4911f575180da9db090ca0e
SHA256fb07db551c31c17ef048f04628cb49f400cf3b5d671b90c3334326755e709afa
SHA512b8f7ab53ce6360665158d4a8944483bfdcf2c7baf7e03bbd5cc53944e8b3cafdf8eacf105e5851f1cf3a200fadfe52ee24230d08ffacbd9ac74be0e76d005c9d
-
Filesize
1.4MB
MD5652ab99bb0d38c2b096919ad9827cca6
SHA19604c9fb9c777f70c4911f575180da9db090ca0e
SHA256fb07db551c31c17ef048f04628cb49f400cf3b5d671b90c3334326755e709afa
SHA512b8f7ab53ce6360665158d4a8944483bfdcf2c7baf7e03bbd5cc53944e8b3cafdf8eacf105e5851f1cf3a200fadfe52ee24230d08ffacbd9ac74be0e76d005c9d