Analysis
-
max time kernel
128s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-06-2022 10:08
Static task
static1
Behavioral task
behavioral1
Sample
ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105.exe
Resource
win10v2004-20220414-en
General
-
Target
ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105.exe
-
Size
1.7MB
-
MD5
e24c03961d09e9ee6c218981e054af2a
-
SHA1
fcb86a0766159acffb08a785239a1af16010d9ff
-
SHA256
ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105
-
SHA512
0d724d370d46357d0041ed7646bc053ca49b8fb4efea7be8c965b79acc733b88eb61052b1dd4b58eb0221aef34d00aff10f292d69a4347ef8a0d41c91bf63ee1
Malware Config
Extracted
buer
http://bbload01.top/
http://bbload02.top/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\ErrorResponder\\errorResponder.exe\"" errorResponder.exe -
resource yara_rule behavioral2/memory/3376-132-0x000000003F320000-0x000000003F76D000-memory.dmp buer behavioral2/memory/3376-133-0x000000003F320000-0x000000003F76D000-memory.dmp buer behavioral2/memory/3376-134-0x000000003F320000-0x000000003F76D000-memory.dmp buer behavioral2/memory/3376-138-0x000000003F320000-0x000000003F76D000-memory.dmp buer behavioral2/memory/4460-142-0x000000003F6A0000-0x000000003FAED000-memory.dmp buer behavioral2/memory/4460-143-0x000000003F6A0000-0x000000003FAED000-memory.dmp buer behavioral2/memory/4460-144-0x000000003F6A0000-0x000000003FAED000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ errorResponder.exe -
Executes dropped EXE 1 IoCs
pid Process 4460 errorResponder.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion errorResponder.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion errorResponder.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Wine ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105.exe Key opened \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Software\Wine errorResponder.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3376 ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105.exe 4460 errorResponder.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2288 3784 WerFault.exe 92 2544 3784 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3376 ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105.exe 3376 ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105.exe 4460 errorResponder.exe 4460 errorResponder.exe 4460 errorResponder.exe 4460 errorResponder.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3376 wrote to memory of 4460 3376 ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105.exe 91 PID 3376 wrote to memory of 4460 3376 ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105.exe 91 PID 3376 wrote to memory of 4460 3376 ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105.exe 91 PID 4460 wrote to memory of 3784 4460 errorResponder.exe 92 PID 4460 wrote to memory of 3784 4460 errorResponder.exe 92 PID 4460 wrote to memory of 3784 4460 errorResponder.exe 92 PID 4460 wrote to memory of 3784 4460 errorResponder.exe 92 PID 4460 wrote to memory of 3784 4460 errorResponder.exe 92 PID 4460 wrote to memory of 3784 4460 errorResponder.exe 92 PID 4460 wrote to memory of 3784 4460 errorResponder.exe 92 PID 4460 wrote to memory of 3784 4460 errorResponder.exe 92 PID 4460 wrote to memory of 3784 4460 errorResponder.exe 92 PID 4460 wrote to memory of 3784 4460 errorResponder.exe 92 PID 4460 wrote to memory of 3784 4460 errorResponder.exe 92 PID 4460 wrote to memory of 3784 4460 errorResponder.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105.exe"C:\Users\Admin\AppData\Local\Temp\ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\ProgramData\ErrorResponder\errorResponder.exeC:\ProgramData\ErrorResponder\errorResponder.exe "C:\Users\Admin\AppData\Local\Temp\ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\ErrorResponder\errorResponder.exe3⤵PID:3784
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3784 -s 2724⤵
- Program crash
PID:2288
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3784 -s 2804⤵
- Program crash
PID:2544
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 3784 -ip 37841⤵PID:4352
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3784 -ip 37841⤵PID:1408
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5e24c03961d09e9ee6c218981e054af2a
SHA1fcb86a0766159acffb08a785239a1af16010d9ff
SHA256ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105
SHA5120d724d370d46357d0041ed7646bc053ca49b8fb4efea7be8c965b79acc733b88eb61052b1dd4b58eb0221aef34d00aff10f292d69a4347ef8a0d41c91bf63ee1
-
Filesize
1.7MB
MD5e24c03961d09e9ee6c218981e054af2a
SHA1fcb86a0766159acffb08a785239a1af16010d9ff
SHA256ba9226a0aca438b5d53eac4025127cb5b8efd81a1b13104447491eba11078105
SHA5120d724d370d46357d0041ed7646bc053ca49b8fb4efea7be8c965b79acc733b88eb61052b1dd4b58eb0221aef34d00aff10f292d69a4347ef8a0d41c91bf63ee1