Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
24/05/2022, 02:17
Static task
static1
Behavioral task
behavioral1
Sample
3d8b7ed35de4a807e9c9b04aaf0f99eb1cd46a9de1970af140ac048d6e2f5367.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3d8b7ed35de4a807e9c9b04aaf0f99eb1cd46a9de1970af140ac048d6e2f5367.exe
Resource
win10v2004-20220414-en
General
-
Target
3d8b7ed35de4a807e9c9b04aaf0f99eb1cd46a9de1970af140ac048d6e2f5367.exe
-
Size
1.8MB
-
MD5
820f5bd213f5ff673013f29e6bdc114e
-
SHA1
62adcd3c613a978648daa640febf4d403fbeffb4
-
SHA256
3d8b7ed35de4a807e9c9b04aaf0f99eb1cd46a9de1970af140ac048d6e2f5367
-
SHA512
98825fe6143b108928f3d849533c768495efd120d0cfb70292c9e6e3a553edca74fdb091948c30185a721d72fb994a6d092f0966d5cc18bbdc2d7aaf84754e1d
Malware Config
Extracted
buer
http://bbload01.top/
http://bbload02.top/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\ErrorResponder\\errorResponder.exe\"" errorResponder.exe -
resource yara_rule behavioral1/memory/1660-56-0x000000003FA60000-0x000000003FEE4000-memory.dmp buer behavioral1/memory/1204-61-0x000000003FC80000-0x0000000040104000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 1204 errorResponder.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3d8b7ed35de4a807e9c9b04aaf0f99eb1cd46a9de1970af140ac048d6e2f5367.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion errorResponder.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion errorResponder.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3d8b7ed35de4a807e9c9b04aaf0f99eb1cd46a9de1970af140ac048d6e2f5367.exe -
Deletes itself 1 IoCs
pid Process 1204 errorResponder.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Wine 3d8b7ed35de4a807e9c9b04aaf0f99eb1cd46a9de1970af140ac048d6e2f5367.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Wine errorResponder.exe -
Loads dropped DLL 1 IoCs
pid Process 1660 3d8b7ed35de4a807e9c9b04aaf0f99eb1cd46a9de1970af140ac048d6e2f5367.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1660 3d8b7ed35de4a807e9c9b04aaf0f99eb1cd46a9de1970af140ac048d6e2f5367.exe 1204 errorResponder.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1660 3d8b7ed35de4a807e9c9b04aaf0f99eb1cd46a9de1970af140ac048d6e2f5367.exe 1204 errorResponder.exe 1204 errorResponder.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1660 wrote to memory of 1204 1660 3d8b7ed35de4a807e9c9b04aaf0f99eb1cd46a9de1970af140ac048d6e2f5367.exe 28 PID 1660 wrote to memory of 1204 1660 3d8b7ed35de4a807e9c9b04aaf0f99eb1cd46a9de1970af140ac048d6e2f5367.exe 28 PID 1660 wrote to memory of 1204 1660 3d8b7ed35de4a807e9c9b04aaf0f99eb1cd46a9de1970af140ac048d6e2f5367.exe 28 PID 1660 wrote to memory of 1204 1660 3d8b7ed35de4a807e9c9b04aaf0f99eb1cd46a9de1970af140ac048d6e2f5367.exe 28 PID 1204 wrote to memory of 1356 1204 errorResponder.exe 29 PID 1204 wrote to memory of 1356 1204 errorResponder.exe 29 PID 1204 wrote to memory of 1356 1204 errorResponder.exe 29 PID 1204 wrote to memory of 1356 1204 errorResponder.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d8b7ed35de4a807e9c9b04aaf0f99eb1cd46a9de1970af140ac048d6e2f5367.exe"C:\Users\Admin\AppData\Local\Temp\3d8b7ed35de4a807e9c9b04aaf0f99eb1cd46a9de1970af140ac048d6e2f5367.exe"1⤵
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\ProgramData\ErrorResponder\errorResponder.exeC:\ProgramData\ErrorResponder\errorResponder.exe "C:\Users\Admin\AppData\Local\Temp\3d8b7ed35de4a807e9c9b04aaf0f99eb1cd46a9de1970af140ac048d6e2f5367.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks BIOS information in registry
- Deletes itself
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\ErrorResponder\errorResponder.exe3⤵PID:1356
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5e40cd17d149719b57af22407157446d3
SHA11b73a4aaecf31e25c6dafd0c48ba91329b2a1f81
SHA2560eb1b32f98f8d9b7addc3e15e3f6b20168a248cee38759917d9f0446ae67e1c5
SHA5128f3aa6b93dd8c091a4bd8337901557063639339ead21e10fa1c1db1bbcaab8e83808ff0e316d803cde7ea41d9a9b9c8b302569d422ec65224ab9ddb2261d58c9
-
Filesize
319KB
MD536193bcaa2a9f72e454291ca1fb1370e
SHA13dc8dd8b88e9408b616fe0aa135754ac6b993f52
SHA2568ca56d66ff70264fffb4d96b6faab79cb420aed7c54f9c180aa700ae6ba55662
SHA5128b266018abf2e66d9a5ae3cb76e35705f596d087a3308b4f1d338a3bcc115286276b36f43179fea6d1007ebcdcf4d6d69a56c1e0fd891b09eb390f2376fee9f3
-
Filesize
1.1MB
MD549587e24ff25a9470c27494c9b3f8fa7
SHA1b755cd214cc8bbdc5111a8e3dddabe1f7554721d
SHA2568f44e10e8340295f0ea482b98e249d89182a361670eb7e3752fc969866beda69
SHA5129d43d09741e8d89933c0d319fc37c1f9ffac3505b8b84b950b63ad1ed29c614e03543fc460d89ed14c666378199b2c20c71efa77c9b43b572fee2483e19be7d8