Analysis
-
max time kernel
148s -
max time network
182s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 07:50
Static task
static1
Behavioral task
behavioral1
Sample
cf8aeb8de311480bf57c259e29b39ce799304dbd3532e93b93907b1d0797ac24.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
cf8aeb8de311480bf57c259e29b39ce799304dbd3532e93b93907b1d0797ac24.exe
Resource
win10v2004-20220414-en
General
-
Target
cf8aeb8de311480bf57c259e29b39ce799304dbd3532e93b93907b1d0797ac24.exe
-
Size
1.6MB
-
MD5
7a4a353f71dca138e5cfb11022a8341a
-
SHA1
3b30f19261c8b2b8ba9873486801811dd0afa47e
-
SHA256
cf8aeb8de311480bf57c259e29b39ce799304dbd3532e93b93907b1d0797ac24
-
SHA512
1f2bbb338fd39474664a82e51cc34a86c815da3262e25f3177c6b631b1cc7de796ea34bbaa6ee5eea1f667b9955c5ee66fc4062b20b5806dc9e43fecb7d74d1a
Malware Config
Extracted
buer
http://burload01.top/
http://burload02.top/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\ErrorResponder\\errorResponder.exe\"" errorResponder.exe -
resource yara_rule behavioral1/memory/972-57-0x000000003F280000-0x000000003F6AB000-memory.dmp buer behavioral1/memory/972-58-0x000000003F280000-0x000000003F6AB000-memory.dmp buer behavioral1/memory/972-60-0x000000003F280000-0x000000003F6AB000-memory.dmp buer behavioral1/memory/972-64-0x000000003F280000-0x000000003F6AB000-memory.dmp buer behavioral1/memory/1956-69-0x000000003F7D0000-0x000000003FBFB000-memory.dmp buer behavioral1/memory/1956-70-0x000000003F7D0000-0x000000003FBFB000-memory.dmp buer behavioral1/memory/1956-71-0x000000003F7D0000-0x000000003FBFB000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cf8aeb8de311480bf57c259e29b39ce799304dbd3532e93b93907b1d0797ac24.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ errorResponder.exe -
Executes dropped EXE 1 IoCs
pid Process 1956 errorResponder.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion errorResponder.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion errorResponder.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cf8aeb8de311480bf57c259e29b39ce799304dbd3532e93b93907b1d0797ac24.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cf8aeb8de311480bf57c259e29b39ce799304dbd3532e93b93907b1d0797ac24.exe -
Deletes itself 1 IoCs
pid Process 1956 errorResponder.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Wine cf8aeb8de311480bf57c259e29b39ce799304dbd3532e93b93907b1d0797ac24.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Wine errorResponder.exe -
Loads dropped DLL 1 IoCs
pid Process 972 cf8aeb8de311480bf57c259e29b39ce799304dbd3532e93b93907b1d0797ac24.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 972 cf8aeb8de311480bf57c259e29b39ce799304dbd3532e93b93907b1d0797ac24.exe 1956 errorResponder.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 972 cf8aeb8de311480bf57c259e29b39ce799304dbd3532e93b93907b1d0797ac24.exe 1956 errorResponder.exe 1956 errorResponder.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 972 wrote to memory of 1956 972 cf8aeb8de311480bf57c259e29b39ce799304dbd3532e93b93907b1d0797ac24.exe 27 PID 972 wrote to memory of 1956 972 cf8aeb8de311480bf57c259e29b39ce799304dbd3532e93b93907b1d0797ac24.exe 27 PID 972 wrote to memory of 1956 972 cf8aeb8de311480bf57c259e29b39ce799304dbd3532e93b93907b1d0797ac24.exe 27 PID 972 wrote to memory of 1956 972 cf8aeb8de311480bf57c259e29b39ce799304dbd3532e93b93907b1d0797ac24.exe 27 PID 1956 wrote to memory of 840 1956 errorResponder.exe 28 PID 1956 wrote to memory of 840 1956 errorResponder.exe 28 PID 1956 wrote to memory of 840 1956 errorResponder.exe 28 PID 1956 wrote to memory of 840 1956 errorResponder.exe 28 PID 1956 wrote to memory of 840 1956 errorResponder.exe 28 PID 1956 wrote to memory of 840 1956 errorResponder.exe 28 PID 1956 wrote to memory of 840 1956 errorResponder.exe 28 PID 1956 wrote to memory of 840 1956 errorResponder.exe 28 PID 1956 wrote to memory of 840 1956 errorResponder.exe 28 PID 1956 wrote to memory of 840 1956 errorResponder.exe 28 PID 1956 wrote to memory of 840 1956 errorResponder.exe 28 PID 1956 wrote to memory of 840 1956 errorResponder.exe 28 PID 1956 wrote to memory of 840 1956 errorResponder.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf8aeb8de311480bf57c259e29b39ce799304dbd3532e93b93907b1d0797ac24.exe"C:\Users\Admin\AppData\Local\Temp\cf8aeb8de311480bf57c259e29b39ce799304dbd3532e93b93907b1d0797ac24.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:972 -
C:\ProgramData\ErrorResponder\errorResponder.exeC:\ProgramData\ErrorResponder\errorResponder.exe "C:\Users\Admin\AppData\Local\Temp\cf8aeb8de311480bf57c259e29b39ce799304dbd3532e93b93907b1d0797ac24.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Deletes itself
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\ErrorResponder\errorResponder.exe3⤵PID:840
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD57a4a353f71dca138e5cfb11022a8341a
SHA13b30f19261c8b2b8ba9873486801811dd0afa47e
SHA256cf8aeb8de311480bf57c259e29b39ce799304dbd3532e93b93907b1d0797ac24
SHA5121f2bbb338fd39474664a82e51cc34a86c815da3262e25f3177c6b631b1cc7de796ea34bbaa6ee5eea1f667b9955c5ee66fc4062b20b5806dc9e43fecb7d74d1a
-
Filesize
1.6MB
MD57a4a353f71dca138e5cfb11022a8341a
SHA13b30f19261c8b2b8ba9873486801811dd0afa47e
SHA256cf8aeb8de311480bf57c259e29b39ce799304dbd3532e93b93907b1d0797ac24
SHA5121f2bbb338fd39474664a82e51cc34a86c815da3262e25f3177c6b631b1cc7de796ea34bbaa6ee5eea1f667b9955c5ee66fc4062b20b5806dc9e43fecb7d74d1a
-
Filesize
1.6MB
MD57a4a353f71dca138e5cfb11022a8341a
SHA13b30f19261c8b2b8ba9873486801811dd0afa47e
SHA256cf8aeb8de311480bf57c259e29b39ce799304dbd3532e93b93907b1d0797ac24
SHA5121f2bbb338fd39474664a82e51cc34a86c815da3262e25f3177c6b631b1cc7de796ea34bbaa6ee5eea1f667b9955c5ee66fc4062b20b5806dc9e43fecb7d74d1a