Analysis
-
max time kernel
141s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 05:17
Static task
static1
Behavioral task
behavioral1
Sample
48169d26f0752a5bb08334a4a41bbd2cc890c326fc0115e3b9ac1db6f9741930.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
48169d26f0752a5bb08334a4a41bbd2cc890c326fc0115e3b9ac1db6f9741930.exe
Resource
win10v2004-20220414-en
General
-
Target
48169d26f0752a5bb08334a4a41bbd2cc890c326fc0115e3b9ac1db6f9741930.exe
-
Size
253KB
-
MD5
5c86e45799654b4ff55e5f84d4a483e2
-
SHA1
f840b9b62d1b4c8072883876edf03a2274323a7f
-
SHA256
48169d26f0752a5bb08334a4a41bbd2cc890c326fc0115e3b9ac1db6f9741930
-
SHA512
c91c1240567eeace40e1cc37580b729fe43040b370b13a7a247c0c706478290855745397cb0f8ba6e79a58b552f66ea2e75fc8f3dd494359776d2e7b978164cf
Malware Config
Extracted
buer
https://95.217.81.68/
http://95.217.81.68:8080/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\ErrorResponder\\errorResponder.exe\"" errorResponder.exe -
resource yara_rule behavioral1/memory/1272-56-0x0000000000220000-0x000000000022A000-memory.dmp buer behavioral1/memory/1272-57-0x0000000040000000-0x00000000442DB000-memory.dmp buer behavioral1/memory/1660-66-0x0000000040000000-0x00000000442DB000-memory.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 1660 errorResponder.exe -
Deletes itself 1 IoCs
pid Process 1660 errorResponder.exe -
Loads dropped DLL 2 IoCs
pid Process 1272 48169d26f0752a5bb08334a4a41bbd2cc890c326fc0115e3b9ac1db6f9741930.exe 1272 48169d26f0752a5bb08334a4a41bbd2cc890c326fc0115e3b9ac1db6f9741930.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1624 628 WerFault.exe 29 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1660 errorResponder.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1272 wrote to memory of 1660 1272 48169d26f0752a5bb08334a4a41bbd2cc890c326fc0115e3b9ac1db6f9741930.exe 28 PID 1272 wrote to memory of 1660 1272 48169d26f0752a5bb08334a4a41bbd2cc890c326fc0115e3b9ac1db6f9741930.exe 28 PID 1272 wrote to memory of 1660 1272 48169d26f0752a5bb08334a4a41bbd2cc890c326fc0115e3b9ac1db6f9741930.exe 28 PID 1272 wrote to memory of 1660 1272 48169d26f0752a5bb08334a4a41bbd2cc890c326fc0115e3b9ac1db6f9741930.exe 28 PID 1660 wrote to memory of 628 1660 errorResponder.exe 29 PID 1660 wrote to memory of 628 1660 errorResponder.exe 29 PID 1660 wrote to memory of 628 1660 errorResponder.exe 29 PID 1660 wrote to memory of 628 1660 errorResponder.exe 29 PID 1660 wrote to memory of 628 1660 errorResponder.exe 29 PID 1660 wrote to memory of 628 1660 errorResponder.exe 29 PID 1660 wrote to memory of 628 1660 errorResponder.exe 29 PID 1660 wrote to memory of 628 1660 errorResponder.exe 29 PID 1660 wrote to memory of 628 1660 errorResponder.exe 29 PID 1660 wrote to memory of 628 1660 errorResponder.exe 29 PID 1660 wrote to memory of 628 1660 errorResponder.exe 29 PID 628 wrote to memory of 1624 628 secinit.exe 30 PID 628 wrote to memory of 1624 628 secinit.exe 30 PID 628 wrote to memory of 1624 628 secinit.exe 30 PID 628 wrote to memory of 1624 628 secinit.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\48169d26f0752a5bb08334a4a41bbd2cc890c326fc0115e3b9ac1db6f9741930.exe"C:\Users\Admin\AppData\Local\Temp\48169d26f0752a5bb08334a4a41bbd2cc890c326fc0115e3b9ac1db6f9741930.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\ProgramData\ErrorResponder\errorResponder.exeC:\ProgramData\ErrorResponder\errorResponder.exe "C:\Users\Admin\AppData\Local\Temp\48169d26f0752a5bb08334a4a41bbd2cc890c326fc0115e3b9ac1db6f9741930.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\ErrorResponder\errorResponder.exe3⤵
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 628 -s 1364⤵
- Program crash
PID:1624
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
253KB
MD55c86e45799654b4ff55e5f84d4a483e2
SHA1f840b9b62d1b4c8072883876edf03a2274323a7f
SHA25648169d26f0752a5bb08334a4a41bbd2cc890c326fc0115e3b9ac1db6f9741930
SHA512c91c1240567eeace40e1cc37580b729fe43040b370b13a7a247c0c706478290855745397cb0f8ba6e79a58b552f66ea2e75fc8f3dd494359776d2e7b978164cf
-
Filesize
253KB
MD55c86e45799654b4ff55e5f84d4a483e2
SHA1f840b9b62d1b4c8072883876edf03a2274323a7f
SHA25648169d26f0752a5bb08334a4a41bbd2cc890c326fc0115e3b9ac1db6f9741930
SHA512c91c1240567eeace40e1cc37580b729fe43040b370b13a7a247c0c706478290855745397cb0f8ba6e79a58b552f66ea2e75fc8f3dd494359776d2e7b978164cf
-
Filesize
253KB
MD55c86e45799654b4ff55e5f84d4a483e2
SHA1f840b9b62d1b4c8072883876edf03a2274323a7f
SHA25648169d26f0752a5bb08334a4a41bbd2cc890c326fc0115e3b9ac1db6f9741930
SHA512c91c1240567eeace40e1cc37580b729fe43040b370b13a7a247c0c706478290855745397cb0f8ba6e79a58b552f66ea2e75fc8f3dd494359776d2e7b978164cf
-
Filesize
253KB
MD55c86e45799654b4ff55e5f84d4a483e2
SHA1f840b9b62d1b4c8072883876edf03a2274323a7f
SHA25648169d26f0752a5bb08334a4a41bbd2cc890c326fc0115e3b9ac1db6f9741930
SHA512c91c1240567eeace40e1cc37580b729fe43040b370b13a7a247c0c706478290855745397cb0f8ba6e79a58b552f66ea2e75fc8f3dd494359776d2e7b978164cf