Analysis

  • max time kernel
    148s
  • max time network
    174s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    24-05-2022 03:10

General

  • Target

    30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49.exe

  • Size

    1.9MB

  • MD5

    b707d0f456635a8dab39a90bb561e89f

  • SHA1

    4acf51810471b9a2b567e17b7b8f624f6271ac92

  • SHA256

    30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49

  • SHA512

    73ea8547a712594173220dcb5631f86d900f42cacbe1e1e988680753b3cac04a67ef554f282029fce3c3ed8a91a7de794961f60b47c8ea9a4429709da6b38b65

Malware Config

Extracted

Family

buer

C2

http://bbload01.top/

http://bbload02.top/

Signatures

  • Buer

    Buer is a new modular loader first seen in August 2019.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Buer Loader 2 IoCs

    Detects Buer loader in memory or disk.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Executes dropped EXE 1 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49.exe
    "C:\Users\Admin\AppData\Local\Temp\30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49.exe"
    1⤵
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1360
    • C:\ProgramData\ErrorResponder\errorResponder.exe
      C:\ProgramData\ErrorResponder\errorResponder.exe "C:\Users\Admin\AppData\Local\Temp\30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49.exe" ensgJJ
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Deletes itself
      • Identifies Wine through registry keys
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1020
      • C:\Windows\SysWOW64\secinit.exe
        C:\ProgramData\ErrorResponder\errorResponder.exe
        3⤵
          PID:1144

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\ErrorResponder\errorResponder.exe

      Filesize

      1.9MB

      MD5

      b707d0f456635a8dab39a90bb561e89f

      SHA1

      4acf51810471b9a2b567e17b7b8f624f6271ac92

      SHA256

      30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49

      SHA512

      73ea8547a712594173220dcb5631f86d900f42cacbe1e1e988680753b3cac04a67ef554f282029fce3c3ed8a91a7de794961f60b47c8ea9a4429709da6b38b65

    • C:\ProgramData\ErrorResponder\errorResponder.exe

      Filesize

      1.9MB

      MD5

      b707d0f456635a8dab39a90bb561e89f

      SHA1

      4acf51810471b9a2b567e17b7b8f624f6271ac92

      SHA256

      30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49

      SHA512

      73ea8547a712594173220dcb5631f86d900f42cacbe1e1e988680753b3cac04a67ef554f282029fce3c3ed8a91a7de794961f60b47c8ea9a4429709da6b38b65

    • \ProgramData\ErrorResponder\errorResponder.exe

      Filesize

      1.9MB

      MD5

      b707d0f456635a8dab39a90bb561e89f

      SHA1

      4acf51810471b9a2b567e17b7b8f624f6271ac92

      SHA256

      30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49

      SHA512

      73ea8547a712594173220dcb5631f86d900f42cacbe1e1e988680753b3cac04a67ef554f282029fce3c3ed8a91a7de794961f60b47c8ea9a4429709da6b38b65

    • memory/1020-63-0x000000003FD90000-0x0000000040253000-memory.dmp

      Filesize

      4.8MB

    • memory/1020-62-0x0000000077DC0000-0x0000000077F40000-memory.dmp

      Filesize

      1.5MB

    • memory/1144-65-0x0000000000240000-0x0000000000703000-memory.dmp

      Filesize

      4.8MB

    • memory/1144-64-0x0000000000240000-0x0000000000703000-memory.dmp

      Filesize

      4.8MB

    • memory/1144-69-0x0000000000240000-0x0000000000703000-memory.dmp

      Filesize

      4.8MB

    • memory/1144-70-0x0000000000240000-0x0000000000703000-memory.dmp

      Filesize

      4.8MB

    • memory/1144-71-0x0000000000240000-0x0000000000703000-memory.dmp

      Filesize

      4.8MB

    • memory/1144-73-0x0000000000240000-0x0000000000703000-memory.dmp

      Filesize

      4.8MB

    • memory/1144-74-0x0000000000080000-0x0000000000081000-memory.dmp

      Filesize

      4KB

    • memory/1144-67-0x0000000000240000-0x0000000000703000-memory.dmp

      Filesize

      4.8MB

    • memory/1144-77-0x0000000000240000-0x0000000000703000-memory.dmp

      Filesize

      4.8MB

    • memory/1360-55-0x0000000077DC0000-0x0000000077F40000-memory.dmp

      Filesize

      1.5MB

    • memory/1360-54-0x0000000076011000-0x0000000076013000-memory.dmp

      Filesize

      8KB

    • memory/1360-56-0x000000003FF10000-0x00000000403D3000-memory.dmp

      Filesize

      4.8MB