Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
24-05-2022 00:55
Static task
static1
Behavioral task
behavioral1
Sample
2f2c65f9e33f564986f7459b52f61c4855cb9c7768acafa7f7da34b481ddab92.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
2f2c65f9e33f564986f7459b52f61c4855cb9c7768acafa7f7da34b481ddab92.exe
Resource
win10v2004-20220414-en
General
-
Target
2f2c65f9e33f564986f7459b52f61c4855cb9c7768acafa7f7da34b481ddab92.exe
-
Size
302KB
-
MD5
1a2546b8cc363618f85ad41532b2506a
-
SHA1
898b6adc52af010648afa56073f77dd7961837f9
-
SHA256
2f2c65f9e33f564986f7459b52f61c4855cb9c7768acafa7f7da34b481ddab92
-
SHA512
45a16da45a553bd98c5f2f152c3dcaea1ce8492e8a1feb44ac572209f923b7c481a876b9d7880b0ff25d7c10c93c3cd56c59668b3459ea240ad673279c787bcb
Malware Config
Extracted
buer
https://gstatiknetiplist.cc/
https://gstatiknetiplist.com/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\ErrorResponder\\responder.exe\"" responder.exe -
resource yara_rule behavioral2/memory/2116-131-0x00000000001C0000-0x00000000001CA000-memory.dmp buer behavioral2/memory/2116-132-0x0000000040000000-0x0000000042A02000-memory.dmp buer behavioral2/memory/312-137-0x0000000040000000-0x0000000042A02000-memory.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 312 responder.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3464 2116 WerFault.exe 23 -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2116 wrote to memory of 312 2116 2f2c65f9e33f564986f7459b52f61c4855cb9c7768acafa7f7da34b481ddab92.exe 87 PID 2116 wrote to memory of 312 2116 2f2c65f9e33f564986f7459b52f61c4855cb9c7768acafa7f7da34b481ddab92.exe 87 PID 2116 wrote to memory of 312 2116 2f2c65f9e33f564986f7459b52f61c4855cb9c7768acafa7f7da34b481ddab92.exe 87 PID 312 wrote to memory of 1252 312 responder.exe 90 PID 312 wrote to memory of 1252 312 responder.exe 90 PID 312 wrote to memory of 1252 312 responder.exe 90 PID 312 wrote to memory of 1252 312 responder.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f2c65f9e33f564986f7459b52f61c4855cb9c7768acafa7f7da34b481ddab92.exe"C:\Users\Admin\AppData\Local\Temp\2f2c65f9e33f564986f7459b52f61c4855cb9c7768acafa7f7da34b481ddab92.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\ProgramData\ErrorResponder\responder.exeC:\ProgramData\ErrorResponder\responder.exe "C:\Users\Admin\AppData\Local\Temp\2f2c65f9e33f564986f7459b52f61c4855cb9c7768acafa7f7da34b481ddab92.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:312 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\ErrorResponder\responder.exe3⤵PID:1252
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2116 -s 4722⤵
- Program crash
PID:3464
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 2116 -ip 21161⤵PID:3000
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
302KB
MD51a2546b8cc363618f85ad41532b2506a
SHA1898b6adc52af010648afa56073f77dd7961837f9
SHA2562f2c65f9e33f564986f7459b52f61c4855cb9c7768acafa7f7da34b481ddab92
SHA51245a16da45a553bd98c5f2f152c3dcaea1ce8492e8a1feb44ac572209f923b7c481a876b9d7880b0ff25d7c10c93c3cd56c59668b3459ea240ad673279c787bcb
-
Filesize
302KB
MD51a2546b8cc363618f85ad41532b2506a
SHA1898b6adc52af010648afa56073f77dd7961837f9
SHA2562f2c65f9e33f564986f7459b52f61c4855cb9c7768acafa7f7da34b481ddab92
SHA51245a16da45a553bd98c5f2f152c3dcaea1ce8492e8a1feb44ac572209f923b7c481a876b9d7880b0ff25d7c10c93c3cd56c59668b3459ea240ad673279c787bcb