Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
25-07-2022 04:06
Static task
static1
Behavioral task
behavioral1
Sample
6a57777ca59bc1e671ed7d78d6919e7a978eab31eb4f7ddd6d04d8d020a1fc9d.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
6a57777ca59bc1e671ed7d78d6919e7a978eab31eb4f7ddd6d04d8d020a1fc9d.exe
Resource
win10v2004-20220721-en
General
-
Target
6a57777ca59bc1e671ed7d78d6919e7a978eab31eb4f7ddd6d04d8d020a1fc9d.exe
-
Size
2.0MB
-
MD5
abd4e9aad8ec61897613808a95b86a7a
-
SHA1
d1962d200b9d79e5e9197050e7f1134c0bd1b22b
-
SHA256
6a57777ca59bc1e671ed7d78d6919e7a978eab31eb4f7ddd6d04d8d020a1fc9d
-
SHA512
42ca936d21a3995f7ba408915d1a9d20a1a5c18e19e4154755ac9e9c8ade80b90ca0daa487247dd3749301a59279864d67d5cd3b7e6c1aa3d7507c995c7edca3
Malware Config
Extracted
buer
http://loy01.top/
http://loy02.top/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\UBlockPlugin\\plugin.exe\"" plugin.exe -
resource yara_rule behavioral1/memory/2020-59-0x000000003F480000-0x000000003F96D000-memory.dmp buer behavioral1/memory/828-75-0x000000003F9A0000-0x000000003FE8D000-memory.dmp buer behavioral1/memory/828-81-0x000000003F9A0000-0x000000003FE8D000-memory.dmp buer behavioral1/memory/828-82-0x000000003F9A0000-0x000000003FE8D000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6a57777ca59bc1e671ed7d78d6919e7a978eab31eb4f7ddd6d04d8d020a1fc9d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ plugin.exe -
Executes dropped EXE 1 IoCs
pid Process 828 plugin.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion plugin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6a57777ca59bc1e671ed7d78d6919e7a978eab31eb4f7ddd6d04d8d020a1fc9d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6a57777ca59bc1e671ed7d78d6919e7a978eab31eb4f7ddd6d04d8d020a1fc9d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion plugin.exe -
Deletes itself 1 IoCs
pid Process 828 plugin.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Wine 6a57777ca59bc1e671ed7d78d6919e7a978eab31eb4f7ddd6d04d8d020a1fc9d.exe Key opened \REGISTRY\USER\S-1-5-21-3762437355-3468409815-1164039494-1000\Software\Wine plugin.exe -
Loads dropped DLL 2 IoCs
pid Process 2020 6a57777ca59bc1e671ed7d78d6919e7a978eab31eb4f7ddd6d04d8d020a1fc9d.exe 2020 6a57777ca59bc1e671ed7d78d6919e7a978eab31eb4f7ddd6d04d8d020a1fc9d.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2020 6a57777ca59bc1e671ed7d78d6919e7a978eab31eb4f7ddd6d04d8d020a1fc9d.exe 828 plugin.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1852 292 WerFault.exe 29 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2020 6a57777ca59bc1e671ed7d78d6919e7a978eab31eb4f7ddd6d04d8d020a1fc9d.exe 828 plugin.exe 828 plugin.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2020 wrote to memory of 828 2020 6a57777ca59bc1e671ed7d78d6919e7a978eab31eb4f7ddd6d04d8d020a1fc9d.exe 28 PID 2020 wrote to memory of 828 2020 6a57777ca59bc1e671ed7d78d6919e7a978eab31eb4f7ddd6d04d8d020a1fc9d.exe 28 PID 2020 wrote to memory of 828 2020 6a57777ca59bc1e671ed7d78d6919e7a978eab31eb4f7ddd6d04d8d020a1fc9d.exe 28 PID 2020 wrote to memory of 828 2020 6a57777ca59bc1e671ed7d78d6919e7a978eab31eb4f7ddd6d04d8d020a1fc9d.exe 28 PID 828 wrote to memory of 292 828 plugin.exe 29 PID 828 wrote to memory of 292 828 plugin.exe 29 PID 828 wrote to memory of 292 828 plugin.exe 29 PID 828 wrote to memory of 292 828 plugin.exe 29 PID 828 wrote to memory of 292 828 plugin.exe 29 PID 828 wrote to memory of 292 828 plugin.exe 29 PID 828 wrote to memory of 292 828 plugin.exe 29 PID 828 wrote to memory of 292 828 plugin.exe 29 PID 828 wrote to memory of 292 828 plugin.exe 29 PID 828 wrote to memory of 292 828 plugin.exe 29 PID 828 wrote to memory of 292 828 plugin.exe 29 PID 828 wrote to memory of 292 828 plugin.exe 29 PID 828 wrote to memory of 292 828 plugin.exe 29 PID 292 wrote to memory of 1852 292 secinit.exe 30 PID 292 wrote to memory of 1852 292 secinit.exe 30 PID 292 wrote to memory of 1852 292 secinit.exe 30 PID 292 wrote to memory of 1852 292 secinit.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a57777ca59bc1e671ed7d78d6919e7a978eab31eb4f7ddd6d04d8d020a1fc9d.exe"C:\Users\Admin\AppData\Local\Temp\6a57777ca59bc1e671ed7d78d6919e7a978eab31eb4f7ddd6d04d8d020a1fc9d.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\ProgramData\UBlockPlugin\plugin.exeC:\ProgramData\UBlockPlugin\plugin.exe "C:\Users\Admin\AppData\Local\Temp\6a57777ca59bc1e671ed7d78d6919e7a978eab31eb4f7ddd6d04d8d020a1fc9d.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Deletes itself
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\UBlockPlugin\plugin.exe3⤵
- Suspicious use of WriteProcessMemory
PID:292 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 292 -s 1364⤵
- Program crash
PID:1852
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5abd4e9aad8ec61897613808a95b86a7a
SHA1d1962d200b9d79e5e9197050e7f1134c0bd1b22b
SHA2566a57777ca59bc1e671ed7d78d6919e7a978eab31eb4f7ddd6d04d8d020a1fc9d
SHA51242ca936d21a3995f7ba408915d1a9d20a1a5c18e19e4154755ac9e9c8ade80b90ca0daa487247dd3749301a59279864d67d5cd3b7e6c1aa3d7507c995c7edca3
-
Filesize
2.0MB
MD5abd4e9aad8ec61897613808a95b86a7a
SHA1d1962d200b9d79e5e9197050e7f1134c0bd1b22b
SHA2566a57777ca59bc1e671ed7d78d6919e7a978eab31eb4f7ddd6d04d8d020a1fc9d
SHA51242ca936d21a3995f7ba408915d1a9d20a1a5c18e19e4154755ac9e9c8ade80b90ca0daa487247dd3749301a59279864d67d5cd3b7e6c1aa3d7507c995c7edca3
-
Filesize
2.0MB
MD5abd4e9aad8ec61897613808a95b86a7a
SHA1d1962d200b9d79e5e9197050e7f1134c0bd1b22b
SHA2566a57777ca59bc1e671ed7d78d6919e7a978eab31eb4f7ddd6d04d8d020a1fc9d
SHA51242ca936d21a3995f7ba408915d1a9d20a1a5c18e19e4154755ac9e9c8ade80b90ca0daa487247dd3749301a59279864d67d5cd3b7e6c1aa3d7507c995c7edca3
-
Filesize
2.0MB
MD5abd4e9aad8ec61897613808a95b86a7a
SHA1d1962d200b9d79e5e9197050e7f1134c0bd1b22b
SHA2566a57777ca59bc1e671ed7d78d6919e7a978eab31eb4f7ddd6d04d8d020a1fc9d
SHA51242ca936d21a3995f7ba408915d1a9d20a1a5c18e19e4154755ac9e9c8ade80b90ca0daa487247dd3749301a59279864d67d5cd3b7e6c1aa3d7507c995c7edca3