Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 04:52
Static task
static1
Behavioral task
behavioral1
Sample
4ffe3bdfc6fe67298681315b83cef2513ad95b9b3e3162b9a5e3a27c44f26fe1.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4ffe3bdfc6fe67298681315b83cef2513ad95b9b3e3162b9a5e3a27c44f26fe1.exe
Resource
win10v2004-20220414-en
General
-
Target
4ffe3bdfc6fe67298681315b83cef2513ad95b9b3e3162b9a5e3a27c44f26fe1.exe
-
Size
2.0MB
-
MD5
a1c86dc81df8c629410fa9970423016e
-
SHA1
96bd00b2a79f00112e5f911019f140c95db19334
-
SHA256
4ffe3bdfc6fe67298681315b83cef2513ad95b9b3e3162b9a5e3a27c44f26fe1
-
SHA512
250b3b28e3e0dd15bdf1bc6443d1a6570d8ff917800b9e4d99b6c0f2d76361a7c4ec0a1b92ba19f9fa0f01399783d587445ae4e95e22c5f1d7aab0413ffabd3f
Malware Config
Extracted
buer
http://bbload01.top/
http://bbload02.top/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\ErrorResponder\\errorResponder.exe\"" errorResponder.exe -
resource yara_rule behavioral1/memory/1972-57-0x000000003FA40000-0x000000003FF22000-memory.dmp buer behavioral1/memory/1972-58-0x000000003FA40000-0x000000003FF22000-memory.dmp buer behavioral1/memory/1972-60-0x000000003FA40000-0x000000003FF22000-memory.dmp buer behavioral1/memory/1972-64-0x000000003FA40000-0x000000003FF22000-memory.dmp buer behavioral1/memory/1152-68-0x000000003F7A0000-0x000000003FC82000-memory.dmp buer behavioral1/memory/1152-69-0x000000003F7A0000-0x000000003FC82000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ errorResponder.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4ffe3bdfc6fe67298681315b83cef2513ad95b9b3e3162b9a5e3a27c44f26fe1.exe -
Executes dropped EXE 1 IoCs
pid Process 1152 errorResponder.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion errorResponder.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4ffe3bdfc6fe67298681315b83cef2513ad95b9b3e3162b9a5e3a27c44f26fe1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4ffe3bdfc6fe67298681315b83cef2513ad95b9b3e3162b9a5e3a27c44f26fe1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion errorResponder.exe -
Deletes itself 1 IoCs
pid Process 1152 errorResponder.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Wine 4ffe3bdfc6fe67298681315b83cef2513ad95b9b3e3162b9a5e3a27c44f26fe1.exe Key opened \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Wine errorResponder.exe -
Loads dropped DLL 1 IoCs
pid Process 1972 4ffe3bdfc6fe67298681315b83cef2513ad95b9b3e3162b9a5e3a27c44f26fe1.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1972 4ffe3bdfc6fe67298681315b83cef2513ad95b9b3e3162b9a5e3a27c44f26fe1.exe 1152 errorResponder.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1972 4ffe3bdfc6fe67298681315b83cef2513ad95b9b3e3162b9a5e3a27c44f26fe1.exe 1152 errorResponder.exe 1152 errorResponder.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1972 wrote to memory of 1152 1972 4ffe3bdfc6fe67298681315b83cef2513ad95b9b3e3162b9a5e3a27c44f26fe1.exe 27 PID 1972 wrote to memory of 1152 1972 4ffe3bdfc6fe67298681315b83cef2513ad95b9b3e3162b9a5e3a27c44f26fe1.exe 27 PID 1972 wrote to memory of 1152 1972 4ffe3bdfc6fe67298681315b83cef2513ad95b9b3e3162b9a5e3a27c44f26fe1.exe 27 PID 1972 wrote to memory of 1152 1972 4ffe3bdfc6fe67298681315b83cef2513ad95b9b3e3162b9a5e3a27c44f26fe1.exe 27 PID 1972 wrote to memory of 1152 1972 4ffe3bdfc6fe67298681315b83cef2513ad95b9b3e3162b9a5e3a27c44f26fe1.exe 27 PID 1972 wrote to memory of 1152 1972 4ffe3bdfc6fe67298681315b83cef2513ad95b9b3e3162b9a5e3a27c44f26fe1.exe 27 PID 1972 wrote to memory of 1152 1972 4ffe3bdfc6fe67298681315b83cef2513ad95b9b3e3162b9a5e3a27c44f26fe1.exe 27 PID 1152 wrote to memory of 1056 1152 errorResponder.exe 28 PID 1152 wrote to memory of 1056 1152 errorResponder.exe 28 PID 1152 wrote to memory of 1056 1152 errorResponder.exe 28 PID 1152 wrote to memory of 1056 1152 errorResponder.exe 28 PID 1152 wrote to memory of 1056 1152 errorResponder.exe 28 PID 1152 wrote to memory of 1056 1152 errorResponder.exe 28 PID 1152 wrote to memory of 1056 1152 errorResponder.exe 28 PID 1152 wrote to memory of 1056 1152 errorResponder.exe 28 PID 1152 wrote to memory of 1056 1152 errorResponder.exe 28 PID 1152 wrote to memory of 1056 1152 errorResponder.exe 28 PID 1152 wrote to memory of 1056 1152 errorResponder.exe 28 PID 1152 wrote to memory of 1056 1152 errorResponder.exe 28 PID 1152 wrote to memory of 1056 1152 errorResponder.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ffe3bdfc6fe67298681315b83cef2513ad95b9b3e3162b9a5e3a27c44f26fe1.exe"C:\Users\Admin\AppData\Local\Temp\4ffe3bdfc6fe67298681315b83cef2513ad95b9b3e3162b9a5e3a27c44f26fe1.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\ProgramData\ErrorResponder\errorResponder.exeC:\ProgramData\ErrorResponder\errorResponder.exe "C:\Users\Admin\AppData\Local\Temp\4ffe3bdfc6fe67298681315b83cef2513ad95b9b3e3162b9a5e3a27c44f26fe1.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Deletes itself
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\ErrorResponder\errorResponder.exe3⤵PID:1056
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD5a1c86dc81df8c629410fa9970423016e
SHA196bd00b2a79f00112e5f911019f140c95db19334
SHA2564ffe3bdfc6fe67298681315b83cef2513ad95b9b3e3162b9a5e3a27c44f26fe1
SHA512250b3b28e3e0dd15bdf1bc6443d1a6570d8ff917800b9e4d99b6c0f2d76361a7c4ec0a1b92ba19f9fa0f01399783d587445ae4e95e22c5f1d7aab0413ffabd3f
-
Filesize
2.0MB
MD5a1c86dc81df8c629410fa9970423016e
SHA196bd00b2a79f00112e5f911019f140c95db19334
SHA2564ffe3bdfc6fe67298681315b83cef2513ad95b9b3e3162b9a5e3a27c44f26fe1
SHA512250b3b28e3e0dd15bdf1bc6443d1a6570d8ff917800b9e4d99b6c0f2d76361a7c4ec0a1b92ba19f9fa0f01399783d587445ae4e95e22c5f1d7aab0413ffabd3f
-
Filesize
2.0MB
MD5a1c86dc81df8c629410fa9970423016e
SHA196bd00b2a79f00112e5f911019f140c95db19334
SHA2564ffe3bdfc6fe67298681315b83cef2513ad95b9b3e3162b9a5e3a27c44f26fe1
SHA512250b3b28e3e0dd15bdf1bc6443d1a6570d8ff917800b9e4d99b6c0f2d76361a7c4ec0a1b92ba19f9fa0f01399783d587445ae4e95e22c5f1d7aab0413ffabd3f