Analysis
-
max time kernel
128s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
24-05-2022 03:10
Static task
static1
Behavioral task
behavioral1
Sample
30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49.exe
Resource
win10v2004-20220414-en
General
-
Target
30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49.exe
-
Size
1.9MB
-
MD5
b707d0f456635a8dab39a90bb561e89f
-
SHA1
4acf51810471b9a2b567e17b7b8f624f6271ac92
-
SHA256
30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49
-
SHA512
73ea8547a712594173220dcb5631f86d900f42cacbe1e1e988680753b3cac04a67ef554f282029fce3c3ed8a91a7de794961f60b47c8ea9a4429709da6b38b65
Malware Config
Extracted
buer
http://bbload01.top/
http://bbload02.top/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\ErrorResponder\\errorResponder.exe\"" errorResponder.exe -
resource yara_rule behavioral2/memory/5104-131-0x000000003FB60000-0x0000000040023000-memory.dmp buer behavioral2/memory/204-136-0x000000003F6A0000-0x000000003FB63000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Executes dropped EXE 1 IoCs
pid Process 204 errorResponder.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion errorResponder.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion errorResponder.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Wine 30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49.exe Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Wine errorResponder.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 5104 30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49.exe 204 errorResponder.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2428 5028 WerFault.exe 87 2828 5028 WerFault.exe 87 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 5104 30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49.exe 5104 30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49.exe 204 errorResponder.exe 204 errorResponder.exe 204 errorResponder.exe 204 errorResponder.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 5104 wrote to memory of 204 5104 30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49.exe 86 PID 5104 wrote to memory of 204 5104 30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49.exe 86 PID 5104 wrote to memory of 204 5104 30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49.exe 86 PID 204 wrote to memory of 5028 204 errorResponder.exe 87 PID 204 wrote to memory of 5028 204 errorResponder.exe 87 PID 204 wrote to memory of 5028 204 errorResponder.exe 87 PID 204 wrote to memory of 5028 204 errorResponder.exe 87 PID 204 wrote to memory of 5028 204 errorResponder.exe 87 PID 204 wrote to memory of 5028 204 errorResponder.exe 87 PID 204 wrote to memory of 5028 204 errorResponder.exe 87 PID 204 wrote to memory of 5028 204 errorResponder.exe 87 PID 204 wrote to memory of 5028 204 errorResponder.exe 87 PID 204 wrote to memory of 5028 204 errorResponder.exe 87 PID 204 wrote to memory of 5028 204 errorResponder.exe 87 PID 204 wrote to memory of 5028 204 errorResponder.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49.exe"C:\Users\Admin\AppData\Local\Temp\30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49.exe"1⤵
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\ProgramData\ErrorResponder\errorResponder.exeC:\ProgramData\ErrorResponder\errorResponder.exe "C:\Users\Admin\AppData\Local\Temp\30f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:204 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\ErrorResponder\errorResponder.exe3⤵PID:5028
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 2604⤵
- Program crash
PID:2428
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 2804⤵
- Program crash
PID:2828
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5028 -ip 50281⤵PID:4500
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 5028 -ip 50281⤵PID:2300
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.9MB
MD5b707d0f456635a8dab39a90bb561e89f
SHA14acf51810471b9a2b567e17b7b8f624f6271ac92
SHA25630f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49
SHA51273ea8547a712594173220dcb5631f86d900f42cacbe1e1e988680753b3cac04a67ef554f282029fce3c3ed8a91a7de794961f60b47c8ea9a4429709da6b38b65
-
Filesize
1.9MB
MD5b707d0f456635a8dab39a90bb561e89f
SHA14acf51810471b9a2b567e17b7b8f624f6271ac92
SHA25630f5f3d2af768cf4eb2dc9fa7508264caffb8acdc623c38bf72ef6f2d89a9d49
SHA51273ea8547a712594173220dcb5631f86d900f42cacbe1e1e988680753b3cac04a67ef554f282029fce3c3ed8a91a7de794961f60b47c8ea9a4429709da6b38b65