Analysis
-
max time kernel
162s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2022 06:55
Static task
static1
Behavioral task
behavioral1
Sample
ca334df8e40d7a2977d979ce91cf79c225612b3bd5bada4920d3777cb08bd5db.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
ca334df8e40d7a2977d979ce91cf79c225612b3bd5bada4920d3777cb08bd5db.exe
Resource
win10v2004-20220721-en
General
-
Target
ca334df8e40d7a2977d979ce91cf79c225612b3bd5bada4920d3777cb08bd5db.exe
-
Size
2.0MB
-
MD5
2f7f60ef423947bac5628fa46a7762ac
-
SHA1
dd4d6463e1b4fad95790682604cde103d457d7c3
-
SHA256
ca334df8e40d7a2977d979ce91cf79c225612b3bd5bada4920d3777cb08bd5db
-
SHA512
8f867da39f77b30a6d405556389ec897aff4213dbf7ee16faff098c5956cdf810b6c83e59c94a25359b6e49ad4f6552724cf8a2b39383d2cd5fabf1abc032653
Malware Config
Extracted
buer
http://loood1.top/
http://loood2.top/
Signatures
-
resource yara_rule behavioral2/memory/4524-135-0x000000003F1F0000-0x000000003F6D6000-memory.dmp buer behavioral2/memory/820-138-0x000000003F6D0000-0x000000003FBB6000-memory.dmp buer behavioral2/memory/820-141-0x000000003F6D0000-0x000000003FBB6000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ manager.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ca334df8e40d7a2977d979ce91cf79c225612b3bd5bada4920d3777cb08bd5db.exe -
Executes dropped EXE 1 IoCs
pid Process 820 manager.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ca334df8e40d7a2977d979ce91cf79c225612b3bd5bada4920d3777cb08bd5db.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ca334df8e40d7a2977d979ce91cf79c225612b3bd5bada4920d3777cb08bd5db.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion manager.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion manager.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Software\Wine ca334df8e40d7a2977d979ce91cf79c225612b3bd5bada4920d3777cb08bd5db.exe Key opened \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Software\Wine manager.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce manager.exe Set value (str) \REGISTRY\USER\S-1-5-21-2372564722-193526734-2636556182-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ActiveX Component = "C:\\Users\\Admin\\AppData\\Roaming\\ActiveX\\manager.exe" manager.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4524 ca334df8e40d7a2977d979ce91cf79c225612b3bd5bada4920d3777cb08bd5db.exe 820 manager.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2516 3464 WerFault.exe 83 3172 3464 WerFault.exe 83 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4524 ca334df8e40d7a2977d979ce91cf79c225612b3bd5bada4920d3777cb08bd5db.exe 4524 ca334df8e40d7a2977d979ce91cf79c225612b3bd5bada4920d3777cb08bd5db.exe 820 manager.exe 820 manager.exe 820 manager.exe 820 manager.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4524 wrote to memory of 820 4524 ca334df8e40d7a2977d979ce91cf79c225612b3bd5bada4920d3777cb08bd5db.exe 82 PID 4524 wrote to memory of 820 4524 ca334df8e40d7a2977d979ce91cf79c225612b3bd5bada4920d3777cb08bd5db.exe 82 PID 4524 wrote to memory of 820 4524 ca334df8e40d7a2977d979ce91cf79c225612b3bd5bada4920d3777cb08bd5db.exe 82 PID 820 wrote to memory of 3464 820 manager.exe 83 PID 820 wrote to memory of 3464 820 manager.exe 83 PID 820 wrote to memory of 3464 820 manager.exe 83 PID 820 wrote to memory of 3464 820 manager.exe 83 PID 820 wrote to memory of 3464 820 manager.exe 83 PID 820 wrote to memory of 3464 820 manager.exe 83 PID 820 wrote to memory of 3464 820 manager.exe 83 PID 820 wrote to memory of 3464 820 manager.exe 83 PID 820 wrote to memory of 3464 820 manager.exe 83 PID 820 wrote to memory of 3464 820 manager.exe 83 PID 820 wrote to memory of 3464 820 manager.exe 83 PID 820 wrote to memory of 3464 820 manager.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca334df8e40d7a2977d979ce91cf79c225612b3bd5bada4920d3777cb08bd5db.exe"C:\Users\Admin\AppData\Local\Temp\ca334df8e40d7a2977d979ce91cf79c225612b3bd5bada4920d3777cb08bd5db.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Roaming\ActiveX\manager.exeC:\Users\Admin\AppData\Roaming\ActiveX\manager.exe "C:\Users\Admin\AppData\Local\Temp\ca334df8e40d7a2977d979ce91cf79c225612b3bd5bada4920d3777cb08bd5db.exe" ensgJJ2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\SysWOW64\secinit.exeC:\Users\Admin\AppData\Roaming\ActiveX\manager.exe3⤵PID:3464
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 2844⤵
- Program crash
PID:2516
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 2924⤵
- Program crash
PID:3172
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3464 -ip 34641⤵PID:4824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 372 -p 3464 -ip 34641⤵PID:432
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD52f7f60ef423947bac5628fa46a7762ac
SHA1dd4d6463e1b4fad95790682604cde103d457d7c3
SHA256ca334df8e40d7a2977d979ce91cf79c225612b3bd5bada4920d3777cb08bd5db
SHA5128f867da39f77b30a6d405556389ec897aff4213dbf7ee16faff098c5956cdf810b6c83e59c94a25359b6e49ad4f6552724cf8a2b39383d2cd5fabf1abc032653
-
Filesize
2.0MB
MD52f7f60ef423947bac5628fa46a7762ac
SHA1dd4d6463e1b4fad95790682604cde103d457d7c3
SHA256ca334df8e40d7a2977d979ce91cf79c225612b3bd5bada4920d3777cb08bd5db
SHA5128f867da39f77b30a6d405556389ec897aff4213dbf7ee16faff098c5956cdf810b6c83e59c94a25359b6e49ad4f6552724cf8a2b39383d2cd5fabf1abc032653