Analysis
-
max time kernel
148s -
max time network
174s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
24-05-2022 03:10
Static task
static1
Behavioral task
behavioral1
Sample
30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49.exe
Resource
win10v2004-20220414-en
General
-
Target
30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49.exe
-
Size
1.9MB
-
MD5
b707d0f456635a8dab39a90bb561e89f
-
SHA1
4acf51810471b9a2b567e17b7b8f624f6271ac92
-
SHA256
30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49
-
SHA512
73ea8547a712594173220dcb5631f86d900f42cacbe1e1e988680753b3cac04a67ef554f282029fce3c3ed8a91a7de794961f60b47c8ea9a4429709da6b38b65
Malware Config
Extracted
buer
http://bbload01.top/
http://bbload02.top/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\ErrorResponder\\errorResponder.exe\"" errorResponder.exe -
resource yara_rule behavioral1/memory/1360-56-0x000000003FF10000-0x00000000403D3000-memory.dmp buer behavioral1/memory/1020-63-0x000000003FD90000-0x0000000040253000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 1020 errorResponder.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion errorResponder.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion errorResponder.exe -
Deletes itself 1 IoCs
pid Process 1020 errorResponder.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Wine 30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Wine errorResponder.exe -
Loads dropped DLL 1 IoCs
pid Process 1360 30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1360 30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49.exe 1020 errorResponder.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1360 30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49.exe 1020 errorResponder.exe 1020 errorResponder.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1360 wrote to memory of 1020 1360 30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49.exe 28 PID 1360 wrote to memory of 1020 1360 30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49.exe 28 PID 1360 wrote to memory of 1020 1360 30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49.exe 28 PID 1360 wrote to memory of 1020 1360 30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49.exe 28 PID 1360 wrote to memory of 1020 1360 30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49.exe 28 PID 1360 wrote to memory of 1020 1360 30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49.exe 28 PID 1360 wrote to memory of 1020 1360 30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49.exe 28 PID 1020 wrote to memory of 1144 1020 errorResponder.exe 29 PID 1020 wrote to memory of 1144 1020 errorResponder.exe 29 PID 1020 wrote to memory of 1144 1020 errorResponder.exe 29 PID 1020 wrote to memory of 1144 1020 errorResponder.exe 29 PID 1020 wrote to memory of 1144 1020 errorResponder.exe 29 PID 1020 wrote to memory of 1144 1020 errorResponder.exe 29 PID 1020 wrote to memory of 1144 1020 errorResponder.exe 29 PID 1020 wrote to memory of 1144 1020 errorResponder.exe 29 PID 1020 wrote to memory of 1144 1020 errorResponder.exe 29 PID 1020 wrote to memory of 1144 1020 errorResponder.exe 29 PID 1020 wrote to memory of 1144 1020 errorResponder.exe 29 PID 1020 wrote to memory of 1144 1020 errorResponder.exe 29 PID 1020 wrote to memory of 1144 1020 errorResponder.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49.exe"C:\Users\Admin\AppData\Local\Temp\30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49.exe"1⤵
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\ProgramData\ErrorResponder\errorResponder.exeC:\ProgramData\ErrorResponder\errorResponder.exe "C:\Users\Admin\AppData\Local\Temp\30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks BIOS information in registry
- Deletes itself
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\ErrorResponder\errorResponder.exe3⤵PID:1144
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5b707d0f456635a8dab39a90bb561e89f
SHA14acf51810471b9a2b567e17b7b8f624f6271ac92
SHA25630f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49
SHA51273ea8547a712594173220dcb5631f86d900f42cacbe1e1e988680753b3cac04a67ef554f282029fce3c3ed8a91a7de794961f60b47c8ea9a4429709da6b38b65
-
Filesize
1.9MB
MD5b707d0f456635a8dab39a90bb561e89f
SHA14acf51810471b9a2b567e17b7b8f624f6271ac92
SHA25630f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49
SHA51273ea8547a712594173220dcb5631f86d900f42cacbe1e1e988680753b3cac04a67ef554f282029fce3c3ed8a91a7de794961f60b47c8ea9a4429709da6b38b65
-
Filesize
1.9MB
MD5b707d0f456635a8dab39a90bb561e89f
SHA14acf51810471b9a2b567e17b7b8f624f6271ac92
SHA25630f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49
SHA51273ea8547a712594173220dcb5631f86d900f42cacbe1e1e988680753b3cac04a67ef554f282029fce3c3ed8a91a7de794961f60b47c8ea9a4429709da6b38b65