Analysis
-
max time kernel
140s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-06-2022 10:08
Static task
static1
Behavioral task
behavioral1
Sample
aba14d216e8ceb209841014dadbe46398c97aec488e4127516541f6b1f3ac61b.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
aba14d216e8ceb209841014dadbe46398c97aec488e4127516541f6b1f3ac61b.exe
Resource
win10v2004-20220414-en
General
-
Target
aba14d216e8ceb209841014dadbe46398c97aec488e4127516541f6b1f3ac61b.exe
-
Size
2.0MB
-
MD5
3eca81e66df552071c3496eab4de2eae
-
SHA1
4e11906bfc2ce971bfd1221f8552f960c632a811
-
SHA256
aba14d216e8ceb209841014dadbe46398c97aec488e4127516541f6b1f3ac61b
-
SHA512
bd695b323e2c581610e41c16c671f5e1ca4b9913075846233ffc6b81611b6f0afa2a953f5ae1b98733af597286568da823311c78717898f21586dacb9705b7d4
Malware Config
Extracted
buer
http://bbload01.top/
http://bbload02.top/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\ErrorResponder\\errorResponder.exe\"" errorResponder.exe -
resource yara_rule behavioral2/memory/4100-131-0x000000003F8F0000-0x000000003FDD4000-memory.dmp buer behavioral2/memory/4100-133-0x000000003F8F0000-0x000000003FDD4000-memory.dmp buer behavioral2/memory/4100-137-0x000000003F8F0000-0x000000003FDD4000-memory.dmp buer behavioral2/memory/4324-141-0x000000003FFB0000-0x0000000040494000-memory.dmp buer behavioral2/memory/4324-142-0x000000003FFB0000-0x0000000040494000-memory.dmp buer behavioral2/memory/4324-143-0x000000003FFB0000-0x0000000040494000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ aba14d216e8ceb209841014dadbe46398c97aec488e4127516541f6b1f3ac61b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ errorResponder.exe -
Executes dropped EXE 1 IoCs
pid Process 4324 errorResponder.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion errorResponder.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion aba14d216e8ceb209841014dadbe46398c97aec488e4127516541f6b1f3ac61b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion aba14d216e8ceb209841014dadbe46398c97aec488e4127516541f6b1f3ac61b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion errorResponder.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Wine errorResponder.exe Key opened \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\Software\Wine aba14d216e8ceb209841014dadbe46398c97aec488e4127516541f6b1f3ac61b.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4100 aba14d216e8ceb209841014dadbe46398c97aec488e4127516541f6b1f3ac61b.exe 4324 errorResponder.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1880 1124 WerFault.exe 82 708 1124 WerFault.exe 82 -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4100 aba14d216e8ceb209841014dadbe46398c97aec488e4127516541f6b1f3ac61b.exe 4100 aba14d216e8ceb209841014dadbe46398c97aec488e4127516541f6b1f3ac61b.exe 4324 errorResponder.exe 4324 errorResponder.exe 4324 errorResponder.exe 4324 errorResponder.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4100 wrote to memory of 4324 4100 aba14d216e8ceb209841014dadbe46398c97aec488e4127516541f6b1f3ac61b.exe 81 PID 4100 wrote to memory of 4324 4100 aba14d216e8ceb209841014dadbe46398c97aec488e4127516541f6b1f3ac61b.exe 81 PID 4100 wrote to memory of 4324 4100 aba14d216e8ceb209841014dadbe46398c97aec488e4127516541f6b1f3ac61b.exe 81 PID 4324 wrote to memory of 1124 4324 errorResponder.exe 82 PID 4324 wrote to memory of 1124 4324 errorResponder.exe 82 PID 4324 wrote to memory of 1124 4324 errorResponder.exe 82 PID 4324 wrote to memory of 1124 4324 errorResponder.exe 82 PID 4324 wrote to memory of 1124 4324 errorResponder.exe 82 PID 4324 wrote to memory of 1124 4324 errorResponder.exe 82 PID 4324 wrote to memory of 1124 4324 errorResponder.exe 82 PID 4324 wrote to memory of 1124 4324 errorResponder.exe 82 PID 4324 wrote to memory of 1124 4324 errorResponder.exe 82 PID 4324 wrote to memory of 1124 4324 errorResponder.exe 82 PID 4324 wrote to memory of 1124 4324 errorResponder.exe 82 PID 4324 wrote to memory of 1124 4324 errorResponder.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\aba14d216e8ceb209841014dadbe46398c97aec488e4127516541f6b1f3ac61b.exe"C:\Users\Admin\AppData\Local\Temp\aba14d216e8ceb209841014dadbe46398c97aec488e4127516541f6b1f3ac61b.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\ProgramData\ErrorResponder\errorResponder.exeC:\ProgramData\ErrorResponder\errorResponder.exe "C:\Users\Admin\AppData\Local\Temp\aba14d216e8ceb209841014dadbe46398c97aec488e4127516541f6b1f3ac61b.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\ErrorResponder\errorResponder.exe3⤵PID:1124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1124 -s 2764⤵
- Program crash
PID:1880
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1124 -s 2924⤵
- Program crash
PID:708
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1124 -ip 11241⤵PID:2284
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1124 -ip 11241⤵PID:3008
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD53eca81e66df552071c3496eab4de2eae
SHA14e11906bfc2ce971bfd1221f8552f960c632a811
SHA256aba14d216e8ceb209841014dadbe46398c97aec488e4127516541f6b1f3ac61b
SHA512bd695b323e2c581610e41c16c671f5e1ca4b9913075846233ffc6b81611b6f0afa2a953f5ae1b98733af597286568da823311c78717898f21586dacb9705b7d4
-
Filesize
2.0MB
MD53eca81e66df552071c3496eab4de2eae
SHA14e11906bfc2ce971bfd1221f8552f960c632a811
SHA256aba14d216e8ceb209841014dadbe46398c97aec488e4127516541f6b1f3ac61b
SHA512bd695b323e2c581610e41c16c671f5e1ca4b9913075846233ffc6b81611b6f0afa2a953f5ae1b98733af597286568da823311c78717898f21586dacb9705b7d4