Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22-01-2024 06:04
Static task
static1
Behavioral task
behavioral1
Sample
6eea66a6e9875547c9f9215428141902.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6eea66a6e9875547c9f9215428141902.exe
Resource
win10v2004-20231215-en
General
-
Target
6eea66a6e9875547c9f9215428141902.exe
-
Size
1.8MB
-
MD5
6eea66a6e9875547c9f9215428141902
-
SHA1
d5b36df76d684df1693c359061d1de086fbe64e0
-
SHA256
4b2ed73de06d0ca3fc62179593223adf95f7118c542d1c5a8761f0629ef0cad7
-
SHA512
fe406ab7568715f2d07d798bbf6158615a9a7b2de299f9a816f168dea0560dc67ff769fd7dc60f5f6354adbe544a85b97f63d389df33641d9b5cb1bc0f46cf69
-
SSDEEP
49152:4vyv0jQUJhNzP5QeQybVoXpRtbv9IjPkCh9/:4g0jQ754QtBIgS
Malware Config
Extracted
buer
http://lodddd01.info/
http://lodddd02.info/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\UBlockPlugin\\plugin.exe\"" plugin.exe -
resource yara_rule behavioral1/memory/2496-10-0x000000003FCF0000-0x000000004017C000-memory.dmp buer behavioral1/memory/2816-15-0x000000003F670000-0x000000003FAFC000-memory.dmp buer behavioral1/memory/2816-30-0x000000003F670000-0x000000003FAFC000-memory.dmp buer behavioral1/memory/2816-31-0x000000003F670000-0x000000003FAFC000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6eea66a6e9875547c9f9215428141902.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ plugin.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6eea66a6e9875547c9f9215428141902.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6eea66a6e9875547c9f9215428141902.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion plugin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion plugin.exe -
Deletes itself 1 IoCs
pid Process 2816 plugin.exe -
Executes dropped EXE 1 IoCs
pid Process 2816 plugin.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Wine 6eea66a6e9875547c9f9215428141902.exe Key opened \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Wine plugin.exe -
Loads dropped DLL 2 IoCs
pid Process 2496 6eea66a6e9875547c9f9215428141902.exe 2496 6eea66a6e9875547c9f9215428141902.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2496 6eea66a6e9875547c9f9215428141902.exe 2816 plugin.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2180 2668 WerFault.exe 29 2900 2816 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2496 6eea66a6e9875547c9f9215428141902.exe 2816 plugin.exe 2816 plugin.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2816 2496 6eea66a6e9875547c9f9215428141902.exe 28 PID 2496 wrote to memory of 2816 2496 6eea66a6e9875547c9f9215428141902.exe 28 PID 2496 wrote to memory of 2816 2496 6eea66a6e9875547c9f9215428141902.exe 28 PID 2496 wrote to memory of 2816 2496 6eea66a6e9875547c9f9215428141902.exe 28 PID 2816 wrote to memory of 2668 2816 plugin.exe 29 PID 2816 wrote to memory of 2668 2816 plugin.exe 29 PID 2816 wrote to memory of 2668 2816 plugin.exe 29 PID 2816 wrote to memory of 2668 2816 plugin.exe 29 PID 2816 wrote to memory of 2668 2816 plugin.exe 29 PID 2816 wrote to memory of 2668 2816 plugin.exe 29 PID 2816 wrote to memory of 2668 2816 plugin.exe 29 PID 2816 wrote to memory of 2668 2816 plugin.exe 29 PID 2816 wrote to memory of 2668 2816 plugin.exe 29 PID 2816 wrote to memory of 2668 2816 plugin.exe 29 PID 2816 wrote to memory of 2668 2816 plugin.exe 29 PID 2816 wrote to memory of 2668 2816 plugin.exe 29 PID 2816 wrote to memory of 2668 2816 plugin.exe 29 PID 2668 wrote to memory of 2180 2668 secinit.exe 30 PID 2668 wrote to memory of 2180 2668 secinit.exe 30 PID 2668 wrote to memory of 2180 2668 secinit.exe 30 PID 2668 wrote to memory of 2180 2668 secinit.exe 30 PID 2816 wrote to memory of 2900 2816 plugin.exe 31 PID 2816 wrote to memory of 2900 2816 plugin.exe 31 PID 2816 wrote to memory of 2900 2816 plugin.exe 31 PID 2816 wrote to memory of 2900 2816 plugin.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\6eea66a6e9875547c9f9215428141902.exe"C:\Users\Admin\AppData\Local\Temp\6eea66a6e9875547c9f9215428141902.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\ProgramData\UBlockPlugin\plugin.exeC:\ProgramData\UBlockPlugin\plugin.exe "C:\Users\Admin\AppData\Local\Temp\6eea66a6e9875547c9f9215428141902.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Deletes itself
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\UBlockPlugin\plugin.exe3⤵
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2668 -s 1364⤵
- Program crash
PID:2180
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 5603⤵
- Program crash
PID:2900
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
960KB
MD53afd33df32ad1fec688d2acc5fe06f48
SHA112b57f9add0f3b83e0ccb7a5db584b3a1d2f0e4f
SHA256cbcf509203bdcbf19965a6f89426770c4d7fecd31b41569c2d4dbe7949ee2f11
SHA5128b0caa5089c0d28ed71e750c0596aab4317dbed8d8db72afc61bec8a861f729d222d1f3778d953bdea0e02368c9017ecafadd9a72154f150c78397d9534d3e67
-
Filesize
1.8MB
MD56eea66a6e9875547c9f9215428141902
SHA1d5b36df76d684df1693c359061d1de086fbe64e0
SHA2564b2ed73de06d0ca3fc62179593223adf95f7118c542d1c5a8761f0629ef0cad7
SHA512fe406ab7568715f2d07d798bbf6158615a9a7b2de299f9a816f168dea0560dc67ff769fd7dc60f5f6354adbe544a85b97f63d389df33641d9b5cb1bc0f46cf69
-
Filesize
448KB
MD55d58dc4d61c4d4913a888bf314e105b9
SHA1b08e7adcec236d674bf8e6f27661f4c584b5d50f
SHA256f0a9602d8777c9548fb025b486f333615cd28ec97a681ab5e2edfad91a37e3ef
SHA5125249803a049ab210fea83fc667292996634a6a717640e3dd30403dd82325cd6f24f42d7693a169e061581394f692b080fe2656f579b6e2245a260427f16947b2
-
Filesize
206KB
MD57256ba7582f046f9cde1011ea868a4b0
SHA14ed37e850212fd7a567980741bda98c9ca8982b9
SHA2567f8fc7959534fbbcc297c6d6b0e181a3ac5d7146085172a10c108cbc8c0f7860
SHA5129096e16f7ac628f6897ed8937eecb509422486619c2331972acad0b73690124047363ea87ff4c51902414bfbfa9683d23ab09bc120e7a042a7778cf68c71ec53
-
Filesize
1.7MB
MD5ea1a30860b351f4b4fb89342674c3651
SHA1814b4e584ff2363b886346f178608d54e9448947
SHA2567532df7b71c7ca8aef53b8e9a66f79a11e5832a427b72ae21ad1fdeb20261dfc
SHA512b045d5562411946826e8f1501c3e10ef97843d547dc233500d6ccdec16126c0738d91f1ccf3c5479709530e8df775574fa34535d4aa91c79390c2cdd9e6f8bdd