Analysis
-
max time kernel
153s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
24-05-2022 02:17
Static task
static1
Behavioral task
behavioral1
Sample
3d8b7ed35de4a807e9c9b04aaf0f99eb1cd46a9de1970af140ac048d6e2f5367.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3d8b7ed35de4a807e9c9b04aaf0f99eb1cd46a9de1970af140ac048d6e2f5367.exe
Resource
win10v2004-20220414-en
General
-
Target
3d8b7ed35de4a807e9c9b04aaf0f99eb1cd46a9de1970af140ac048d6e2f5367.exe
-
Size
1.8MB
-
MD5
820f5bd213f5ff673013f29e6bdc114e
-
SHA1
62adcd3c613a978648daa640febf4d403fbeffb4
-
SHA256
3d8b7ed35de4a807e9c9b04aaf0f99eb1cd46a9de1970af140ac048d6e2f5367
-
SHA512
98825fe6143b108928f3d849533c768495efd120d0cfb70292c9e6e3a553edca74fdb091948c30185a721d72fb994a6d092f0966d5cc18bbdc2d7aaf84754e1d
Malware Config
Extracted
buer
http://bbload01.top/
http://bbload02.top/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\ErrorResponder\\errorResponder.exe\"" errorResponder.exe -
resource yara_rule behavioral2/memory/1792-131-0x000000003F4D0000-0x000000003F954000-memory.dmp buer behavioral2/memory/1800-136-0x000000003FA30000-0x000000003FEB4000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 1800 errorResponder.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3d8b7ed35de4a807e9c9b04aaf0f99eb1cd46a9de1970af140ac048d6e2f5367.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3d8b7ed35de4a807e9c9b04aaf0f99eb1cd46a9de1970af140ac048d6e2f5367.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion errorResponder.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion errorResponder.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Wine 3d8b7ed35de4a807e9c9b04aaf0f99eb1cd46a9de1970af140ac048d6e2f5367.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Wine errorResponder.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1792 3d8b7ed35de4a807e9c9b04aaf0f99eb1cd46a9de1970af140ac048d6e2f5367.exe 1800 errorResponder.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3040 2008 WerFault.exe 87 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1792 3d8b7ed35de4a807e9c9b04aaf0f99eb1cd46a9de1970af140ac048d6e2f5367.exe 1792 3d8b7ed35de4a807e9c9b04aaf0f99eb1cd46a9de1970af140ac048d6e2f5367.exe 1800 errorResponder.exe 1800 errorResponder.exe 1800 errorResponder.exe 1800 errorResponder.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1792 wrote to memory of 1800 1792 3d8b7ed35de4a807e9c9b04aaf0f99eb1cd46a9de1970af140ac048d6e2f5367.exe 86 PID 1792 wrote to memory of 1800 1792 3d8b7ed35de4a807e9c9b04aaf0f99eb1cd46a9de1970af140ac048d6e2f5367.exe 86 PID 1792 wrote to memory of 1800 1792 3d8b7ed35de4a807e9c9b04aaf0f99eb1cd46a9de1970af140ac048d6e2f5367.exe 86 PID 1800 wrote to memory of 2008 1800 errorResponder.exe 87 PID 1800 wrote to memory of 2008 1800 errorResponder.exe 87 PID 1800 wrote to memory of 2008 1800 errorResponder.exe 87 PID 1800 wrote to memory of 2008 1800 errorResponder.exe 87 PID 1800 wrote to memory of 2008 1800 errorResponder.exe 87 PID 1800 wrote to memory of 2008 1800 errorResponder.exe 87 PID 1800 wrote to memory of 2008 1800 errorResponder.exe 87 PID 1800 wrote to memory of 2008 1800 errorResponder.exe 87 PID 1800 wrote to memory of 2008 1800 errorResponder.exe 87 PID 1800 wrote to memory of 2008 1800 errorResponder.exe 87 PID 1800 wrote to memory of 2008 1800 errorResponder.exe 87 PID 1800 wrote to memory of 2008 1800 errorResponder.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d8b7ed35de4a807e9c9b04aaf0f99eb1cd46a9de1970af140ac048d6e2f5367.exe"C:\Users\Admin\AppData\Local\Temp\3d8b7ed35de4a807e9c9b04aaf0f99eb1cd46a9de1970af140ac048d6e2f5367.exe"1⤵
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\ProgramData\ErrorResponder\errorResponder.exeC:\ProgramData\ErrorResponder\errorResponder.exe "C:\Users\Admin\AppData\Local\Temp\3d8b7ed35de4a807e9c9b04aaf0f99eb1cd46a9de1970af140ac048d6e2f5367.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\ErrorResponder\errorResponder.exe3⤵PID:2008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2008 -s 2884⤵
- Program crash
PID:3040
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2008 -ip 20081⤵PID:2128
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
618KB
MD59e551520bad4023c6f238028c4b2c61d
SHA1b1a9a51dda72a96a7dbe404b8037fb2eeed621df
SHA256e2c34f50eba4dab63329238e2a2ce7aafc4cbf39dfa5b9ff50053557e08fb33a
SHA5121fd7d5902ae85a6afa1c08eaad59c8e8b18f26cea807f8b337a2da7b786e056b819479dc04b731bad9c15cbebc807bc90ae780538fbd25c0829508e72659dea1
-
Filesize
1.1MB
MD588e11919e2b1890ddaf9133d92e5d801
SHA18a64c130ccdac17fde88968a3ab130f0c71919d7
SHA256fbc3ef142d2b0f1c9d850048f59f34318c1bf407720cebe46fc76a872b994dd6
SHA51250d732f3ecac37582ca719ebe13cc626cf855acc380c4e51c018374fd631f141623b16ea8745f380b77c5db37cd2edfcf7527e62c0e31d5c30b7eac89c449768