Analysis

  • max time kernel
    138s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    25-06-2022 06:33

General

  • Target

    4e2a2755b00b276e03677a1444df7317bef390529fa774f9999f907cbce73157.exe

  • Size

    252KB

  • MD5

    91b6202963740e3e9649a14e6a129533

  • SHA1

    16e35c52fc3ac675eadd7c12a13cbc6419c4a0c1

  • SHA256

    4e2a2755b00b276e03677a1444df7317bef390529fa774f9999f907cbce73157

  • SHA512

    c7c71805a32d8d951b7cb60aa0a722995e3abc0d50107688953bf0c2df06a314b150bebdb3208c8bdb6b60d654c16ff3dcfe03fab34d6adfbb62f6abfdc23f80

Score
10/10

Malware Config

Extracted

Family

buer

C2

https://95.217.81.68/

http://95.217.81.68:8080/

Signatures

  • Buer

    Buer is a new modular loader first seen in August 2019.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Buer Loader 3 IoCs

    Detects Buer loader in memory or disk.

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4e2a2755b00b276e03677a1444df7317bef390529fa774f9999f907cbce73157.exe
    "C:\Users\Admin\AppData\Local\Temp\4e2a2755b00b276e03677a1444df7317bef390529fa774f9999f907cbce73157.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1236
    • C:\ProgramData\ErrorResponder\errorResponder.exe
      C:\ProgramData\ErrorResponder\errorResponder.exe "C:\Users\Admin\AppData\Local\Temp\4e2a2755b00b276e03677a1444df7317bef390529fa774f9999f907cbce73157.exe" ensgJJ
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Deletes itself
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1256
      • C:\Windows\SysWOW64\secinit.exe
        C:\ProgramData\ErrorResponder\errorResponder.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1976
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 136
          4⤵
          • Program crash
          PID:520

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\ErrorResponder\errorResponder.exe

    Filesize

    252KB

    MD5

    91b6202963740e3e9649a14e6a129533

    SHA1

    16e35c52fc3ac675eadd7c12a13cbc6419c4a0c1

    SHA256

    4e2a2755b00b276e03677a1444df7317bef390529fa774f9999f907cbce73157

    SHA512

    c7c71805a32d8d951b7cb60aa0a722995e3abc0d50107688953bf0c2df06a314b150bebdb3208c8bdb6b60d654c16ff3dcfe03fab34d6adfbb62f6abfdc23f80

  • C:\ProgramData\ErrorResponder\errorResponder.exe

    Filesize

    252KB

    MD5

    91b6202963740e3e9649a14e6a129533

    SHA1

    16e35c52fc3ac675eadd7c12a13cbc6419c4a0c1

    SHA256

    4e2a2755b00b276e03677a1444df7317bef390529fa774f9999f907cbce73157

    SHA512

    c7c71805a32d8d951b7cb60aa0a722995e3abc0d50107688953bf0c2df06a314b150bebdb3208c8bdb6b60d654c16ff3dcfe03fab34d6adfbb62f6abfdc23f80

  • \ProgramData\ErrorResponder\errorResponder.exe

    Filesize

    252KB

    MD5

    91b6202963740e3e9649a14e6a129533

    SHA1

    16e35c52fc3ac675eadd7c12a13cbc6419c4a0c1

    SHA256

    4e2a2755b00b276e03677a1444df7317bef390529fa774f9999f907cbce73157

    SHA512

    c7c71805a32d8d951b7cb60aa0a722995e3abc0d50107688953bf0c2df06a314b150bebdb3208c8bdb6b60d654c16ff3dcfe03fab34d6adfbb62f6abfdc23f80

  • \ProgramData\ErrorResponder\errorResponder.exe

    Filesize

    252KB

    MD5

    91b6202963740e3e9649a14e6a129533

    SHA1

    16e35c52fc3ac675eadd7c12a13cbc6419c4a0c1

    SHA256

    4e2a2755b00b276e03677a1444df7317bef390529fa774f9999f907cbce73157

    SHA512

    c7c71805a32d8d951b7cb60aa0a722995e3abc0d50107688953bf0c2df06a314b150bebdb3208c8bdb6b60d654c16ff3dcfe03fab34d6adfbb62f6abfdc23f80

  • memory/1236-54-0x0000000075BD1000-0x0000000075BD3000-memory.dmp

    Filesize

    8KB

  • memory/1236-56-0x0000000000220000-0x000000000022A000-memory.dmp

    Filesize

    40KB

  • memory/1236-55-0x000000000042B000-0x0000000000433000-memory.dmp

    Filesize

    32KB

  • memory/1236-57-0x0000000040000000-0x00000000442DB000-memory.dmp

    Filesize

    66.9MB

  • memory/1236-62-0x000000000042B000-0x0000000000433000-memory.dmp

    Filesize

    32KB

  • memory/1256-65-0x000000000058B000-0x0000000000593000-memory.dmp

    Filesize

    32KB

  • memory/1256-66-0x0000000040000000-0x00000000442DB000-memory.dmp

    Filesize

    66.9MB

  • memory/1976-67-0x00000000004A0000-0x000000000477B000-memory.dmp

    Filesize

    66.9MB

  • memory/1976-68-0x00000000004A0000-0x000000000477B000-memory.dmp

    Filesize

    66.9MB

  • memory/1976-70-0x00000000004A0000-0x000000000477B000-memory.dmp

    Filesize

    66.9MB

  • memory/1976-72-0x00000000004A0000-0x000000000477B000-memory.dmp

    Filesize

    66.9MB

  • memory/1976-74-0x00000000004A0000-0x000000000477B000-memory.dmp

    Filesize

    66.9MB

  • memory/1976-76-0x00000000000C0000-0x00000000000C1000-memory.dmp

    Filesize

    4KB

  • memory/1976-80-0x00000000004A0000-0x000000000477B000-memory.dmp

    Filesize

    66.9MB