Analysis
-
max time kernel
149s -
max time network
194s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 10:08
Static task
static1
Behavioral task
behavioral1
Sample
ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105.exe
Resource
win10v2004-20220414-en
General
-
Target
ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105.exe
-
Size
1.7MB
-
MD5
e24c03961d09e9ee6c218981e054af2a
-
SHA1
fcb86a0766159acffb08a785239a1af16010d9ff
-
SHA256
ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105
-
SHA512
0d724d370d46357d0041ed7646bc053ca49b8fb4efea7be8c965b79acc733b88eb61052b1dd4b58eb0221aef34d00aff10f292d69a4347ef8a0d41c91bf63ee1
Malware Config
Extracted
buer
http://bbload01.top/
http://bbload02.top/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\ErrorResponder\\errorResponder.exe\"" errorResponder.exe -
resource yara_rule behavioral1/memory/1528-57-0x000000003F730000-0x000000003FB7D000-memory.dmp buer behavioral1/memory/1528-58-0x000000003F730000-0x000000003FB7D000-memory.dmp buer behavioral1/memory/1528-60-0x000000003F730000-0x000000003FB7D000-memory.dmp buer behavioral1/memory/1528-64-0x000000003F730000-0x000000003FB7D000-memory.dmp buer behavioral1/memory/1008-69-0x000000003F8B0000-0x000000003FCFD000-memory.dmp buer behavioral1/memory/1008-70-0x000000003F8B0000-0x000000003FCFD000-memory.dmp buer behavioral1/memory/1008-71-0x000000003F8B0000-0x000000003FCFD000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ errorResponder.exe -
Executes dropped EXE 1 IoCs
pid Process 1008 errorResponder.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion errorResponder.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion errorResponder.exe -
Deletes itself 1 IoCs
pid Process 1008 errorResponder.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Wine ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Wine errorResponder.exe -
Loads dropped DLL 1 IoCs
pid Process 1528 ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1528 ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105.exe 1008 errorResponder.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1528 ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105.exe 1008 errorResponder.exe 1008 errorResponder.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1528 wrote to memory of 1008 1528 ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105.exe 27 PID 1528 wrote to memory of 1008 1528 ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105.exe 27 PID 1528 wrote to memory of 1008 1528 ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105.exe 27 PID 1528 wrote to memory of 1008 1528 ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105.exe 27 PID 1528 wrote to memory of 1008 1528 ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105.exe 27 PID 1528 wrote to memory of 1008 1528 ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105.exe 27 PID 1528 wrote to memory of 1008 1528 ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105.exe 27 PID 1008 wrote to memory of 1404 1008 errorResponder.exe 28 PID 1008 wrote to memory of 1404 1008 errorResponder.exe 28 PID 1008 wrote to memory of 1404 1008 errorResponder.exe 28 PID 1008 wrote to memory of 1404 1008 errorResponder.exe 28 PID 1008 wrote to memory of 1404 1008 errorResponder.exe 28 PID 1008 wrote to memory of 1404 1008 errorResponder.exe 28 PID 1008 wrote to memory of 1404 1008 errorResponder.exe 28 PID 1008 wrote to memory of 1404 1008 errorResponder.exe 28 PID 1008 wrote to memory of 1404 1008 errorResponder.exe 28 PID 1008 wrote to memory of 1404 1008 errorResponder.exe 28 PID 1008 wrote to memory of 1404 1008 errorResponder.exe 28 PID 1008 wrote to memory of 1404 1008 errorResponder.exe 28 PID 1008 wrote to memory of 1404 1008 errorResponder.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105.exe"C:\Users\Admin\AppData\Local\Temp\ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\ProgramData\ErrorResponder\errorResponder.exeC:\ProgramData\ErrorResponder\errorResponder.exe "C:\Users\Admin\AppData\Local\Temp\ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Deletes itself
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\ErrorResponder\errorResponder.exe3⤵PID:1404
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5e24c03961d09e9ee6c218981e054af2a
SHA1fcb86a0766159acffb08a785239a1af16010d9ff
SHA256ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105
SHA5120d724d370d46357d0041ed7646bc053ca49b8fb4efea7be8c965b79acc733b88eb61052b1dd4b58eb0221aef34d00aff10f292d69a4347ef8a0d41c91bf63ee1
-
Filesize
1.7MB
MD5e24c03961d09e9ee6c218981e054af2a
SHA1fcb86a0766159acffb08a785239a1af16010d9ff
SHA256ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105
SHA5120d724d370d46357d0041ed7646bc053ca49b8fb4efea7be8c965b79acc733b88eb61052b1dd4b58eb0221aef34d00aff10f292d69a4347ef8a0d41c91bf63ee1
-
Filesize
1.7MB
MD5e24c03961d09e9ee6c218981e054af2a
SHA1fcb86a0766159acffb08a785239a1af16010d9ff
SHA256ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105
SHA5120d724d370d46357d0041ed7646bc053ca49b8fb4efea7be8c965b79acc733b88eb61052b1dd4b58eb0221aef34d00aff10f292d69a4347ef8a0d41c91bf63ee1