Analysis
-
max time kernel
152s -
max time network
162s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
10-11-2020 09:05
Static task
static1
Behavioral task
behavioral1
Sample
87d4ae3570608110b899d582e238ddfff0c411be980adb48b1ba7177be2b14ae.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
87d4ae3570608110b899d582e238ddfff0c411be980adb48b1ba7177be2b14ae.exe
Resource
win10v20201028
General
-
Target
87d4ae3570608110b899d582e238ddfff0c411be980adb48b1ba7177be2b14ae.exe
-
Size
35KB
-
MD5
69c7b8274b687875a08b20311147a9dd
-
SHA1
9ab047d53100e007c1ef89a0769a949d83d39367
-
SHA256
87d4ae3570608110b899d582e238ddfff0c411be980adb48b1ba7177be2b14ae
-
SHA512
fb13c89282524ec99e339d6d94d4fdb8f9e29d39fc72881937229737b7b90b1e3f27652f1e2c16975b08cdd70213dbc8fd092dc37e274dad0a2723dfbcbadd33
Malware Config
Extracted
buer
https://free-soft.cc/
https://free-pc-soft.cc/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\ErrorResponder\\responder.exe\"" responder.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\ErrorResponder\\responder.exe\"" secinit.exe -
Buer Loader 5 IoCs
Detects Buer loader in memory or disk.
resource yara_rule behavioral1/files/0x000d00000000560a-0.dat buer behavioral1/files/0x000d00000000560a-1.dat buer behavioral1/files/0x000d00000000560a-3.dat buer behavioral1/files/0x000d00000000560a-4.dat buer behavioral1/memory/1620-6-0x0000000000000000-mapping.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 1792 responder.exe -
Loads dropped DLL 2 IoCs
pid Process 1876 87d4ae3570608110b899d582e238ddfff0c411be980adb48b1ba7177be2b14ae.exe 1876 87d4ae3570608110b899d582e238ddfff0c411be980adb48b1ba7177be2b14ae.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: secinit.exe File opened (read-only) \??\T: secinit.exe File opened (read-only) \??\Y: secinit.exe File opened (read-only) \??\A: secinit.exe File opened (read-only) \??\H: secinit.exe File opened (read-only) \??\L: secinit.exe File opened (read-only) \??\Q: secinit.exe File opened (read-only) \??\J: secinit.exe File opened (read-only) \??\P: secinit.exe File opened (read-only) \??\W: secinit.exe File opened (read-only) \??\B: secinit.exe File opened (read-only) \??\E: secinit.exe File opened (read-only) \??\F: secinit.exe File opened (read-only) \??\G: secinit.exe File opened (read-only) \??\Z: secinit.exe File opened (read-only) \??\K: secinit.exe File opened (read-only) \??\N: secinit.exe File opened (read-only) \??\S: secinit.exe File opened (read-only) \??\X: secinit.exe File opened (read-only) \??\V: secinit.exe File opened (read-only) \??\I: secinit.exe File opened (read-only) \??\M: secinit.exe File opened (read-only) \??\O: secinit.exe File opened (read-only) \??\U: secinit.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1620 secinit.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1876 wrote to memory of 1792 1876 87d4ae3570608110b899d582e238ddfff0c411be980adb48b1ba7177be2b14ae.exe 29 PID 1876 wrote to memory of 1792 1876 87d4ae3570608110b899d582e238ddfff0c411be980adb48b1ba7177be2b14ae.exe 29 PID 1876 wrote to memory of 1792 1876 87d4ae3570608110b899d582e238ddfff0c411be980adb48b1ba7177be2b14ae.exe 29 PID 1876 wrote to memory of 1792 1876 87d4ae3570608110b899d582e238ddfff0c411be980adb48b1ba7177be2b14ae.exe 29 PID 1792 wrote to memory of 1620 1792 responder.exe 30 PID 1792 wrote to memory of 1620 1792 responder.exe 30 PID 1792 wrote to memory of 1620 1792 responder.exe 30 PID 1792 wrote to memory of 1620 1792 responder.exe 30 PID 1792 wrote to memory of 1620 1792 responder.exe 30 PID 1792 wrote to memory of 1620 1792 responder.exe 30 PID 1792 wrote to memory of 1620 1792 responder.exe 30 PID 1792 wrote to memory of 1620 1792 responder.exe 30 PID 1792 wrote to memory of 1620 1792 responder.exe 30 PID 1792 wrote to memory of 1620 1792 responder.exe 30 PID 1792 wrote to memory of 1620 1792 responder.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\87d4ae3570608110b899d582e238ddfff0c411be980adb48b1ba7177be2b14ae.exe"C:\Users\Admin\AppData\Local\Temp\87d4ae3570608110b899d582e238ddfff0c411be980adb48b1ba7177be2b14ae.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\ProgramData\ErrorResponder\responder.exeC:\ProgramData\ErrorResponder\responder.exe "C:\Users\Admin\AppData\Local\Temp\87d4ae3570608110b899d582e238ddfff0c411be980adb48b1ba7177be2b14ae.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\ErrorResponder\responder.exe3⤵
- Modifies WinLogon for persistence
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
PID:1620
-
-