Analysis
-
max time kernel
124s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2022 04:06
Static task
static1
Behavioral task
behavioral1
Sample
6a57777ca59bc1e671ed7d78d6919e7a978eab31eb4f7ddd6d04d8d020a1fc9d.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
6a57777ca59bc1e671ed7d78d6919e7a978eab31eb4f7ddd6d04d8d020a1fc9d.exe
Resource
win10v2004-20220721-en
General
-
Target
6a57777ca59bc1e671ed7d78d6919e7a978eab31eb4f7ddd6d04d8d020a1fc9d.exe
-
Size
2.0MB
-
MD5
abd4e9aad8ec61897613808a95b86a7a
-
SHA1
d1962d200b9d79e5e9197050e7f1134c0bd1b22b
-
SHA256
6a57777ca59bc1e671ed7d78d6919e7a978eab31eb4f7ddd6d04d8d020a1fc9d
-
SHA512
42ca936d21a3995f7ba408915d1a9d20a1a5c18e19e4154755ac9e9c8ade80b90ca0daa487247dd3749301a59279864d67d5cd3b7e6c1aa3d7507c995c7edca3
Malware Config
Extracted
buer
http://loy01.top/
http://loy02.top/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\UBlockPlugin\\plugin.exe\"" plugin.exe -
resource yara_rule behavioral2/memory/396-134-0x000000003FC90000-0x000000004017D000-memory.dmp buer behavioral2/memory/4880-139-0x000000003F7A0000-0x000000003FC8D000-memory.dmp buer behavioral2/memory/4880-140-0x000000003F7A0000-0x000000003FC8D000-memory.dmp buer behavioral2/memory/4880-142-0x000000003F7A0000-0x000000003FC8D000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6a57777ca59bc1e671ed7d78d6919e7a978eab31eb4f7ddd6d04d8d020a1fc9d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ plugin.exe -
Executes dropped EXE 1 IoCs
pid Process 4880 plugin.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6a57777ca59bc1e671ed7d78d6919e7a978eab31eb4f7ddd6d04d8d020a1fc9d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6a57777ca59bc1e671ed7d78d6919e7a978eab31eb4f7ddd6d04d8d020a1fc9d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion plugin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion plugin.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\Software\Wine 6a57777ca59bc1e671ed7d78d6919e7a978eab31eb4f7ddd6d04d8d020a1fc9d.exe Key opened \REGISTRY\USER\S-1-5-21-2660308776-3705150086-26593515-1000\Software\Wine plugin.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 396 6a57777ca59bc1e671ed7d78d6919e7a978eab31eb4f7ddd6d04d8d020a1fc9d.exe 4880 plugin.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4052 4140 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 396 6a57777ca59bc1e671ed7d78d6919e7a978eab31eb4f7ddd6d04d8d020a1fc9d.exe 396 6a57777ca59bc1e671ed7d78d6919e7a978eab31eb4f7ddd6d04d8d020a1fc9d.exe 4880 plugin.exe 4880 plugin.exe 4880 plugin.exe 4880 plugin.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 396 wrote to memory of 4880 396 6a57777ca59bc1e671ed7d78d6919e7a978eab31eb4f7ddd6d04d8d020a1fc9d.exe 82 PID 396 wrote to memory of 4880 396 6a57777ca59bc1e671ed7d78d6919e7a978eab31eb4f7ddd6d04d8d020a1fc9d.exe 82 PID 396 wrote to memory of 4880 396 6a57777ca59bc1e671ed7d78d6919e7a978eab31eb4f7ddd6d04d8d020a1fc9d.exe 82 PID 4880 wrote to memory of 4140 4880 plugin.exe 83 PID 4880 wrote to memory of 4140 4880 plugin.exe 83 PID 4880 wrote to memory of 4140 4880 plugin.exe 83 PID 4880 wrote to memory of 4140 4880 plugin.exe 83 PID 4880 wrote to memory of 4140 4880 plugin.exe 83 PID 4880 wrote to memory of 4140 4880 plugin.exe 83 PID 4880 wrote to memory of 4140 4880 plugin.exe 83 PID 4880 wrote to memory of 4140 4880 plugin.exe 83 PID 4880 wrote to memory of 4140 4880 plugin.exe 83 PID 4880 wrote to memory of 4140 4880 plugin.exe 83 PID 4880 wrote to memory of 4140 4880 plugin.exe 83 PID 4880 wrote to memory of 4140 4880 plugin.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a57777ca59bc1e671ed7d78d6919e7a978eab31eb4f7ddd6d04d8d020a1fc9d.exe"C:\Users\Admin\AppData\Local\Temp\6a57777ca59bc1e671ed7d78d6919e7a978eab31eb4f7ddd6d04d8d020a1fc9d.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:396 -
C:\ProgramData\UBlockPlugin\plugin.exeC:\ProgramData\UBlockPlugin\plugin.exe "C:\Users\Admin\AppData\Local\Temp\6a57777ca59bc1e671ed7d78d6919e7a978eab31eb4f7ddd6d04d8d020a1fc9d.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\UBlockPlugin\plugin.exe3⤵PID:4140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4140 -s 1884⤵
- Program crash
PID:4052
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4140 -ip 41401⤵PID:408
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5abd4e9aad8ec61897613808a95b86a7a
SHA1d1962d200b9d79e5e9197050e7f1134c0bd1b22b
SHA2566a57777ca59bc1e671ed7d78d6919e7a978eab31eb4f7ddd6d04d8d020a1fc9d
SHA51242ca936d21a3995f7ba408915d1a9d20a1a5c18e19e4154755ac9e9c8ade80b90ca0daa487247dd3749301a59279864d67d5cd3b7e6c1aa3d7507c995c7edca3
-
Filesize
2.0MB
MD5abd4e9aad8ec61897613808a95b86a7a
SHA1d1962d200b9d79e5e9197050e7f1134c0bd1b22b
SHA2566a57777ca59bc1e671ed7d78d6919e7a978eab31eb4f7ddd6d04d8d020a1fc9d
SHA51242ca936d21a3995f7ba408915d1a9d20a1a5c18e19e4154755ac9e9c8ade80b90ca0daa487247dd3749301a59279864d67d5cd3b7e6c1aa3d7507c995c7edca3