Analysis
-
max time kernel
146s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
24-05-2022 22:16
Static task
static1
Behavioral task
behavioral1
Sample
6d969949ad751206ad4a722f8305585b88113a1abf342411fc9bbb5e79d4834f.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
6d969949ad751206ad4a722f8305585b88113a1abf342411fc9bbb5e79d4834f.exe
Resource
win10v2004-20220414-en
General
-
Target
6d969949ad751206ad4a722f8305585b88113a1abf342411fc9bbb5e79d4834f.exe
-
Size
1.9MB
-
MD5
fbaf48e37d532389bc0dbb3bc48c629f
-
SHA1
7b5d1a86826b4f947c14369acce0d27198119bec
-
SHA256
6d969949ad751206ad4a722f8305585b88113a1abf342411fc9bbb5e79d4834f
-
SHA512
945623b3aa28676b93b7b9d49c4dc548b6b5e76838268563abd8ba6d75027567663cb78647698ef908f89ab22de5718f94727cefddfd0a41f38bc5ca60ea61d0
Malware Config
Extracted
buer
http://bbload01.top/
http://bbload02.top/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\ErrorResponder\\errorResponder.exe\"" errorResponder.exe -
resource yara_rule behavioral2/memory/3888-131-0x000000003F100000-0x000000003F5A1000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 1276 errorResponder.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6d969949ad751206ad4a722f8305585b88113a1abf342411fc9bbb5e79d4834f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6d969949ad751206ad4a722f8305585b88113a1abf342411fc9bbb5e79d4834f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion errorResponder.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion errorResponder.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Wine 6d969949ad751206ad4a722f8305585b88113a1abf342411fc9bbb5e79d4834f.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Wine errorResponder.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3888 6d969949ad751206ad4a722f8305585b88113a1abf342411fc9bbb5e79d4834f.exe 1276 errorResponder.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2304 392 WerFault.exe 86 1512 392 WerFault.exe 86 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3888 6d969949ad751206ad4a722f8305585b88113a1abf342411fc9bbb5e79d4834f.exe 3888 6d969949ad751206ad4a722f8305585b88113a1abf342411fc9bbb5e79d4834f.exe 1276 errorResponder.exe 1276 errorResponder.exe 1276 errorResponder.exe 1276 errorResponder.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3888 wrote to memory of 1276 3888 6d969949ad751206ad4a722f8305585b88113a1abf342411fc9bbb5e79d4834f.exe 85 PID 3888 wrote to memory of 1276 3888 6d969949ad751206ad4a722f8305585b88113a1abf342411fc9bbb5e79d4834f.exe 85 PID 3888 wrote to memory of 1276 3888 6d969949ad751206ad4a722f8305585b88113a1abf342411fc9bbb5e79d4834f.exe 85 PID 1276 wrote to memory of 392 1276 errorResponder.exe 86 PID 1276 wrote to memory of 392 1276 errorResponder.exe 86 PID 1276 wrote to memory of 392 1276 errorResponder.exe 86 PID 1276 wrote to memory of 392 1276 errorResponder.exe 86 PID 1276 wrote to memory of 392 1276 errorResponder.exe 86 PID 1276 wrote to memory of 392 1276 errorResponder.exe 86 PID 1276 wrote to memory of 392 1276 errorResponder.exe 86 PID 1276 wrote to memory of 392 1276 errorResponder.exe 86 PID 1276 wrote to memory of 392 1276 errorResponder.exe 86 PID 1276 wrote to memory of 392 1276 errorResponder.exe 86 PID 1276 wrote to memory of 392 1276 errorResponder.exe 86 PID 1276 wrote to memory of 392 1276 errorResponder.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d969949ad751206ad4a722f8305585b88113a1abf342411fc9bbb5e79d4834f.exe"C:\Users\Admin\AppData\Local\Temp\6d969949ad751206ad4a722f8305585b88113a1abf342411fc9bbb5e79d4834f.exe"1⤵
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\ProgramData\ErrorResponder\errorResponder.exeC:\ProgramData\ErrorResponder\errorResponder.exe "C:\Users\Admin\AppData\Local\Temp\6d969949ad751206ad4a722f8305585b88113a1abf342411fc9bbb5e79d4834f.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\ErrorResponder\errorResponder.exe3⤵PID:392
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 392 -s 2724⤵
- Program crash
PID:2304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 392 -s 2924⤵
- Program crash
PID:1512
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 392 -ip 3921⤵PID:3980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 392 -ip 3921⤵PID:4712