Analysis
-
max time kernel
200s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 02:24
Static task
static1
Behavioral task
behavioral1
Sample
e173a639506cfac3f65723d711ad072d18b95f2776581d43407e1ffb6bec441f.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
e173a639506cfac3f65723d711ad072d18b95f2776581d43407e1ffb6bec441f.exe
Resource
win10v2004-20220414-en
General
-
Target
e173a639506cfac3f65723d711ad072d18b95f2776581d43407e1ffb6bec441f.exe
-
Size
236KB
-
MD5
f539613bb8aa110f64481c22d073f510
-
SHA1
c961c5aec12d17d0e6427bb2886619d604947c9a
-
SHA256
e173a639506cfac3f65723d711ad072d18b95f2776581d43407e1ffb6bec441f
-
SHA512
dba51c39a1d9f8cfe9d2a9b1cd9b06cb25f8bc60d3cae43105bb32cee0e7ff96960bd2438d4ee6e641a1416c05a5c67036696e195bb9f1cf17e49ebf158fc276
Malware Config
Extracted
buer
https://gstatiknetiplist.cc/
https://gstatiknetiplist.com/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\ErrorResponder\\responder.exe\"" responder.exe -
resource yara_rule behavioral1/memory/936-57-0x00000000003A0000-0x00000000003AA000-memory.dmp buer behavioral1/memory/936-58-0x0000000040000000-0x0000000042824000-memory.dmp buer behavioral1/memory/2040-68-0x0000000040000000-0x0000000042824000-memory.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 2040 responder.exe -
Deletes itself 1 IoCs
pid Process 2040 responder.exe -
Loads dropped DLL 2 IoCs
pid Process 936 e173a639506cfac3f65723d711ad072d18b95f2776581d43407e1ffb6bec441f.exe 936 e173a639506cfac3f65723d711ad072d18b95f2776581d43407e1ffb6bec441f.exe -
Enumerates connected drives 3 TTPs 20 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: responder.exe File opened (read-only) \??\T: responder.exe File opened (read-only) \??\G: responder.exe File opened (read-only) \??\O: responder.exe File opened (read-only) \??\H: responder.exe File opened (read-only) \??\N: responder.exe File opened (read-only) \??\Q: responder.exe File opened (read-only) \??\S: responder.exe File opened (read-only) \??\V: responder.exe File opened (read-only) \??\E: responder.exe File opened (read-only) \??\F: responder.exe File opened (read-only) \??\M: responder.exe File opened (read-only) \??\P: responder.exe File opened (read-only) \??\U: responder.exe File opened (read-only) \??\I: responder.exe File opened (read-only) \??\L: responder.exe File opened (read-only) \??\J: responder.exe File opened (read-only) \??\K: responder.exe File opened (read-only) \??\A: responder.exe File opened (read-only) \??\B: responder.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 660 1308 WerFault.exe 29 -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 936 wrote to memory of 2040 936 e173a639506cfac3f65723d711ad072d18b95f2776581d43407e1ffb6bec441f.exe 28 PID 936 wrote to memory of 2040 936 e173a639506cfac3f65723d711ad072d18b95f2776581d43407e1ffb6bec441f.exe 28 PID 936 wrote to memory of 2040 936 e173a639506cfac3f65723d711ad072d18b95f2776581d43407e1ffb6bec441f.exe 28 PID 936 wrote to memory of 2040 936 e173a639506cfac3f65723d711ad072d18b95f2776581d43407e1ffb6bec441f.exe 28 PID 2040 wrote to memory of 1308 2040 responder.exe 29 PID 2040 wrote to memory of 1308 2040 responder.exe 29 PID 2040 wrote to memory of 1308 2040 responder.exe 29 PID 2040 wrote to memory of 1308 2040 responder.exe 29 PID 2040 wrote to memory of 1308 2040 responder.exe 29 PID 2040 wrote to memory of 1308 2040 responder.exe 29 PID 2040 wrote to memory of 1308 2040 responder.exe 29 PID 2040 wrote to memory of 1308 2040 responder.exe 29 PID 2040 wrote to memory of 1308 2040 responder.exe 29 PID 2040 wrote to memory of 1308 2040 responder.exe 29 PID 2040 wrote to memory of 1308 2040 responder.exe 29 PID 1308 wrote to memory of 660 1308 secinit.exe 30 PID 1308 wrote to memory of 660 1308 secinit.exe 30 PID 1308 wrote to memory of 660 1308 secinit.exe 30 PID 1308 wrote to memory of 660 1308 secinit.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\e173a639506cfac3f65723d711ad072d18b95f2776581d43407e1ffb6bec441f.exe"C:\Users\Admin\AppData\Local\Temp\e173a639506cfac3f65723d711ad072d18b95f2776581d43407e1ffb6bec441f.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:936 -
C:\ProgramData\ErrorResponder\responder.exeC:\ProgramData\ErrorResponder\responder.exe "C:\Users\Admin\AppData\Local\Temp\e173a639506cfac3f65723d711ad072d18b95f2776581d43407e1ffb6bec441f.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Deletes itself
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\ErrorResponder\responder.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1308 -s 1364⤵
- Program crash
PID:660
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD5f539613bb8aa110f64481c22d073f510
SHA1c961c5aec12d17d0e6427bb2886619d604947c9a
SHA256e173a639506cfac3f65723d711ad072d18b95f2776581d43407e1ffb6bec441f
SHA512dba51c39a1d9f8cfe9d2a9b1cd9b06cb25f8bc60d3cae43105bb32cee0e7ff96960bd2438d4ee6e641a1416c05a5c67036696e195bb9f1cf17e49ebf158fc276
-
Filesize
236KB
MD5f539613bb8aa110f64481c22d073f510
SHA1c961c5aec12d17d0e6427bb2886619d604947c9a
SHA256e173a639506cfac3f65723d711ad072d18b95f2776581d43407e1ffb6bec441f
SHA512dba51c39a1d9f8cfe9d2a9b1cd9b06cb25f8bc60d3cae43105bb32cee0e7ff96960bd2438d4ee6e641a1416c05a5c67036696e195bb9f1cf17e49ebf158fc276
-
Filesize
236KB
MD5f539613bb8aa110f64481c22d073f510
SHA1c961c5aec12d17d0e6427bb2886619d604947c9a
SHA256e173a639506cfac3f65723d711ad072d18b95f2776581d43407e1ffb6bec441f
SHA512dba51c39a1d9f8cfe9d2a9b1cd9b06cb25f8bc60d3cae43105bb32cee0e7ff96960bd2438d4ee6e641a1416c05a5c67036696e195bb9f1cf17e49ebf158fc276
-
Filesize
236KB
MD5f539613bb8aa110f64481c22d073f510
SHA1c961c5aec12d17d0e6427bb2886619d604947c9a
SHA256e173a639506cfac3f65723d711ad072d18b95f2776581d43407e1ffb6bec441f
SHA512dba51c39a1d9f8cfe9d2a9b1cd9b06cb25f8bc60d3cae43105bb32cee0e7ff96960bd2438d4ee6e641a1416c05a5c67036696e195bb9f1cf17e49ebf158fc276