Analysis
-
max time kernel
138s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 06:33
Static task
static1
Behavioral task
behavioral1
Sample
4e2a2755b00b276e03677a1444df7317bef390529fa774f9999f907cbce73157.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4e2a2755b00b276e03677a1444df7317bef390529fa774f9999f907cbce73157.exe
Resource
win10v2004-20220414-en
General
-
Target
4e2a2755b00b276e03677a1444df7317bef390529fa774f9999f907cbce73157.exe
-
Size
252KB
-
MD5
91b6202963740e3e9649a14e6a129533
-
SHA1
16e35c52fc3ac675eadd7c12a13cbc6419c4a0c1
-
SHA256
4e2a2755b00b276e03677a1444df7317bef390529fa774f9999f907cbce73157
-
SHA512
c7c71805a32d8d951b7cb60aa0a722995e3abc0d50107688953bf0c2df06a314b150bebdb3208c8bdb6b60d654c16ff3dcfe03fab34d6adfbb62f6abfdc23f80
Malware Config
Extracted
buer
https://95.217.81.68/
http://95.217.81.68:8080/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\ErrorResponder\\errorResponder.exe\"" errorResponder.exe -
resource yara_rule behavioral1/memory/1236-56-0x0000000000220000-0x000000000022A000-memory.dmp buer behavioral1/memory/1236-57-0x0000000040000000-0x00000000442DB000-memory.dmp buer behavioral1/memory/1256-66-0x0000000040000000-0x00000000442DB000-memory.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 1256 errorResponder.exe -
Deletes itself 1 IoCs
pid Process 1256 errorResponder.exe -
Loads dropped DLL 2 IoCs
pid Process 1236 4e2a2755b00b276e03677a1444df7317bef390529fa774f9999f907cbce73157.exe 1236 4e2a2755b00b276e03677a1444df7317bef390529fa774f9999f907cbce73157.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 520 1976 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1256 errorResponder.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1236 wrote to memory of 1256 1236 4e2a2755b00b276e03677a1444df7317bef390529fa774f9999f907cbce73157.exe 27 PID 1236 wrote to memory of 1256 1236 4e2a2755b00b276e03677a1444df7317bef390529fa774f9999f907cbce73157.exe 27 PID 1236 wrote to memory of 1256 1236 4e2a2755b00b276e03677a1444df7317bef390529fa774f9999f907cbce73157.exe 27 PID 1236 wrote to memory of 1256 1236 4e2a2755b00b276e03677a1444df7317bef390529fa774f9999f907cbce73157.exe 27 PID 1256 wrote to memory of 1976 1256 errorResponder.exe 28 PID 1256 wrote to memory of 1976 1256 errorResponder.exe 28 PID 1256 wrote to memory of 1976 1256 errorResponder.exe 28 PID 1256 wrote to memory of 1976 1256 errorResponder.exe 28 PID 1256 wrote to memory of 1976 1256 errorResponder.exe 28 PID 1256 wrote to memory of 1976 1256 errorResponder.exe 28 PID 1256 wrote to memory of 1976 1256 errorResponder.exe 28 PID 1256 wrote to memory of 1976 1256 errorResponder.exe 28 PID 1256 wrote to memory of 1976 1256 errorResponder.exe 28 PID 1256 wrote to memory of 1976 1256 errorResponder.exe 28 PID 1256 wrote to memory of 1976 1256 errorResponder.exe 28 PID 1976 wrote to memory of 520 1976 secinit.exe 29 PID 1976 wrote to memory of 520 1976 secinit.exe 29 PID 1976 wrote to memory of 520 1976 secinit.exe 29 PID 1976 wrote to memory of 520 1976 secinit.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e2a2755b00b276e03677a1444df7317bef390529fa774f9999f907cbce73157.exe"C:\Users\Admin\AppData\Local\Temp\4e2a2755b00b276e03677a1444df7317bef390529fa774f9999f907cbce73157.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\ProgramData\ErrorResponder\errorResponder.exeC:\ProgramData\ErrorResponder\errorResponder.exe "C:\Users\Admin\AppData\Local\Temp\4e2a2755b00b276e03677a1444df7317bef390529fa774f9999f907cbce73157.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\ErrorResponder\errorResponder.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 1364⤵
- Program crash
PID:520
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD591b6202963740e3e9649a14e6a129533
SHA116e35c52fc3ac675eadd7c12a13cbc6419c4a0c1
SHA2564e2a2755b00b276e03677a1444df7317bef390529fa774f9999f907cbce73157
SHA512c7c71805a32d8d951b7cb60aa0a722995e3abc0d50107688953bf0c2df06a314b150bebdb3208c8bdb6b60d654c16ff3dcfe03fab34d6adfbb62f6abfdc23f80
-
Filesize
252KB
MD591b6202963740e3e9649a14e6a129533
SHA116e35c52fc3ac675eadd7c12a13cbc6419c4a0c1
SHA2564e2a2755b00b276e03677a1444df7317bef390529fa774f9999f907cbce73157
SHA512c7c71805a32d8d951b7cb60aa0a722995e3abc0d50107688953bf0c2df06a314b150bebdb3208c8bdb6b60d654c16ff3dcfe03fab34d6adfbb62f6abfdc23f80
-
Filesize
252KB
MD591b6202963740e3e9649a14e6a129533
SHA116e35c52fc3ac675eadd7c12a13cbc6419c4a0c1
SHA2564e2a2755b00b276e03677a1444df7317bef390529fa774f9999f907cbce73157
SHA512c7c71805a32d8d951b7cb60aa0a722995e3abc0d50107688953bf0c2df06a314b150bebdb3208c8bdb6b60d654c16ff3dcfe03fab34d6adfbb62f6abfdc23f80
-
Filesize
252KB
MD591b6202963740e3e9649a14e6a129533
SHA116e35c52fc3ac675eadd7c12a13cbc6419c4a0c1
SHA2564e2a2755b00b276e03677a1444df7317bef390529fa774f9999f907cbce73157
SHA512c7c71805a32d8d951b7cb60aa0a722995e3abc0d50107688953bf0c2df06a314b150bebdb3208c8bdb6b60d654c16ff3dcfe03fab34d6adfbb62f6abfdc23f80