Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
23-05-2022 20:33
Static task
static1
Behavioral task
behavioral1
Sample
014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f.exe
Resource
win10v2004-20220414-en
General
-
Target
014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f.exe
-
Size
1.8MB
-
MD5
e91cc94bcf70a4cd3a8f8c7df1bf88fa
-
SHA1
2ac449ecfca9d525b8b65da6c47a5525c0fe48b9
-
SHA256
014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f
-
SHA512
964dc41bbd55e571562f2c2d7f8c738efb1b31a9ff69d153d8e1af6c435080da65712641bbe7a69d5effff1a0defa20ebdf81670c7260ce3c5b590c09a4cb0c1
Malware Config
Extracted
buer
http://bbload01.top/
http://bbload02.top/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\ErrorResponder\\errorResponder.exe\"" errorResponder.exe -
resource yara_rule behavioral1/memory/2040-56-0x000000003FAC0000-0x000000003FF40000-memory.dmp buer behavioral1/memory/1160-63-0x000000003F750000-0x000000003FBD0000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 1160 errorResponder.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion errorResponder.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion errorResponder.exe -
Deletes itself 1 IoCs
pid Process 1160 errorResponder.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Wine errorResponder.exe Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Wine 014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f.exe -
Loads dropped DLL 1 IoCs
pid Process 2040 014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2040 014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f.exe 1160 errorResponder.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2040 014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f.exe 1160 errorResponder.exe 1160 errorResponder.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2040 wrote to memory of 1160 2040 014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f.exe 27 PID 2040 wrote to memory of 1160 2040 014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f.exe 27 PID 2040 wrote to memory of 1160 2040 014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f.exe 27 PID 2040 wrote to memory of 1160 2040 014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f.exe 27 PID 2040 wrote to memory of 1160 2040 014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f.exe 27 PID 2040 wrote to memory of 1160 2040 014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f.exe 27 PID 2040 wrote to memory of 1160 2040 014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f.exe 27 PID 1160 wrote to memory of 1532 1160 errorResponder.exe 28 PID 1160 wrote to memory of 1532 1160 errorResponder.exe 28 PID 1160 wrote to memory of 1532 1160 errorResponder.exe 28 PID 1160 wrote to memory of 1532 1160 errorResponder.exe 28 PID 1160 wrote to memory of 1532 1160 errorResponder.exe 28 PID 1160 wrote to memory of 1532 1160 errorResponder.exe 28 PID 1160 wrote to memory of 1532 1160 errorResponder.exe 28 PID 1160 wrote to memory of 1532 1160 errorResponder.exe 28 PID 1160 wrote to memory of 1532 1160 errorResponder.exe 28 PID 1160 wrote to memory of 1532 1160 errorResponder.exe 28 PID 1160 wrote to memory of 1532 1160 errorResponder.exe 28 PID 1160 wrote to memory of 1532 1160 errorResponder.exe 28 PID 1160 wrote to memory of 1532 1160 errorResponder.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f.exe"C:\Users\Admin\AppData\Local\Temp\014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f.exe"1⤵
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\ProgramData\ErrorResponder\errorResponder.exeC:\ProgramData\ErrorResponder\errorResponder.exe "C:\Users\Admin\AppData\Local\Temp\014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks BIOS information in registry
- Deletes itself
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\ErrorResponder\errorResponder.exe3⤵PID:1532
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5e91cc94bcf70a4cd3a8f8c7df1bf88fa
SHA12ac449ecfca9d525b8b65da6c47a5525c0fe48b9
SHA256014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f
SHA512964dc41bbd55e571562f2c2d7f8c738efb1b31a9ff69d153d8e1af6c435080da65712641bbe7a69d5effff1a0defa20ebdf81670c7260ce3c5b590c09a4cb0c1
-
Filesize
1.8MB
MD5e91cc94bcf70a4cd3a8f8c7df1bf88fa
SHA12ac449ecfca9d525b8b65da6c47a5525c0fe48b9
SHA256014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f
SHA512964dc41bbd55e571562f2c2d7f8c738efb1b31a9ff69d153d8e1af6c435080da65712641bbe7a69d5effff1a0defa20ebdf81670c7260ce3c5b590c09a4cb0c1
-
Filesize
1.8MB
MD5e91cc94bcf70a4cd3a8f8c7df1bf88fa
SHA12ac449ecfca9d525b8b65da6c47a5525c0fe48b9
SHA256014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f
SHA512964dc41bbd55e571562f2c2d7f8c738efb1b31a9ff69d153d8e1af6c435080da65712641bbe7a69d5effff1a0defa20ebdf81670c7260ce3c5b590c09a4cb0c1