Analysis
-
max time kernel
124s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
23-05-2022 20:33
Static task
static1
Behavioral task
behavioral1
Sample
014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f.exe
Resource
win10v2004-20220414-en
General
-
Target
014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f.exe
-
Size
1.8MB
-
MD5
e91cc94bcf70a4cd3a8f8c7df1bf88fa
-
SHA1
2ac449ecfca9d525b8b65da6c47a5525c0fe48b9
-
SHA256
014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f
-
SHA512
964dc41bbd55e571562f2c2d7f8c738efb1b31a9ff69d153d8e1af6c435080da65712641bbe7a69d5effff1a0defa20ebdf81670c7260ce3c5b590c09a4cb0c1
Malware Config
Extracted
buer
http://bbload01.top/
http://bbload02.top/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\ErrorResponder\\errorResponder.exe\"" errorResponder.exe -
resource yara_rule behavioral2/memory/1860-131-0x000000003FC70000-0x00000000400F0000-memory.dmp buer behavioral2/memory/1528-136-0x000000003F200000-0x000000003F680000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 1528 errorResponder.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion errorResponder.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion errorResponder.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Wine 014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f.exe Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Wine errorResponder.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1860 014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f.exe 1528 errorResponder.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4500 3408 WerFault.exe 90 3880 3408 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1860 014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f.exe 1860 014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f.exe 1528 errorResponder.exe 1528 errorResponder.exe 1528 errorResponder.exe 1528 errorResponder.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1860 wrote to memory of 1528 1860 014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f.exe 89 PID 1860 wrote to memory of 1528 1860 014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f.exe 89 PID 1860 wrote to memory of 1528 1860 014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f.exe 89 PID 1528 wrote to memory of 3408 1528 errorResponder.exe 90 PID 1528 wrote to memory of 3408 1528 errorResponder.exe 90 PID 1528 wrote to memory of 3408 1528 errorResponder.exe 90 PID 1528 wrote to memory of 3408 1528 errorResponder.exe 90 PID 1528 wrote to memory of 3408 1528 errorResponder.exe 90 PID 1528 wrote to memory of 3408 1528 errorResponder.exe 90 PID 1528 wrote to memory of 3408 1528 errorResponder.exe 90 PID 1528 wrote to memory of 3408 1528 errorResponder.exe 90 PID 1528 wrote to memory of 3408 1528 errorResponder.exe 90 PID 1528 wrote to memory of 3408 1528 errorResponder.exe 90 PID 1528 wrote to memory of 3408 1528 errorResponder.exe 90 PID 1528 wrote to memory of 3408 1528 errorResponder.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f.exe"C:\Users\Admin\AppData\Local\Temp\014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f.exe"1⤵
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\ProgramData\ErrorResponder\errorResponder.exeC:\ProgramData\ErrorResponder\errorResponder.exe "C:\Users\Admin\AppData\Local\Temp\014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\ErrorResponder\errorResponder.exe3⤵PID:3408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3408 -s 2604⤵
- Program crash
PID:4500
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3408 -s 3164⤵
- Program crash
PID:3880
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3408 -ip 34081⤵PID:5104
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3408 -ip 34081⤵PID:3364
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD5e91cc94bcf70a4cd3a8f8c7df1bf88fa
SHA12ac449ecfca9d525b8b65da6c47a5525c0fe48b9
SHA256014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f
SHA512964dc41bbd55e571562f2c2d7f8c738efb1b31a9ff69d153d8e1af6c435080da65712641bbe7a69d5effff1a0defa20ebdf81670c7260ce3c5b590c09a4cb0c1
-
Filesize
1.8MB
MD5e91cc94bcf70a4cd3a8f8c7df1bf88fa
SHA12ac449ecfca9d525b8b65da6c47a5525c0fe48b9
SHA256014a00ff4eb8eabdd9a7e2e0a0d322cfab2cd2a0f65855e98eef290b217d7c8f
SHA512964dc41bbd55e571562f2c2d7f8c738efb1b31a9ff69d153d8e1af6c435080da65712641bbe7a69d5effff1a0defa20ebdf81670c7260ce3c5b590c09a4cb0c1