Analysis
-
max time kernel
150s -
max time network
165s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 10:08
Static task
static1
Behavioral task
behavioral1
Sample
4f9daccbc02a2fa0bcc5149af49dcef672fdf2683e9f5ab471a0aa633c386a27.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4f9daccbc02a2fa0bcc5149af49dcef672fdf2683e9f5ab471a0aa633c386a27.exe
Resource
win10v2004-20220414-en
General
-
Target
4f9daccbc02a2fa0bcc5149af49dcef672fdf2683e9f5ab471a0aa633c386a27.exe
-
Size
1.8MB
-
MD5
29e83eb08c474cf1a86c910cb09ddf68
-
SHA1
3ff2d663dfd76dbeed99deb4136f1ec5f924e94f
-
SHA256
4f9daccbc02a2fa0bcc5149af49dcef672fdf2683e9f5ab471a0aa633c386a27
-
SHA512
bda8b5501954758dd3357124041aa1e66eda227181c47830b617d41097b1f4ba87733b1a4314726ebc952c94b25c9b07cacb10eb271e70c07b09265dd3a45bd3
Malware Config
Extracted
buer
http://bbload01.top/
http://bbload02.top/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\ErrorResponder\\errorResponder.exe\"" errorResponder.exe -
resource yara_rule behavioral1/memory/1700-57-0x000000003F7D0000-0x000000003FC58000-memory.dmp buer behavioral1/memory/1700-58-0x000000003F7D0000-0x000000003FC58000-memory.dmp buer behavioral1/memory/1700-60-0x000000003F7D0000-0x000000003FC58000-memory.dmp buer behavioral1/memory/1700-64-0x000000003F7D0000-0x000000003FC58000-memory.dmp buer behavioral1/memory/468-70-0x000000003F7D0000-0x000000003FC58000-memory.dmp buer behavioral1/memory/468-71-0x000000003F7D0000-0x000000003FC58000-memory.dmp buer behavioral1/memory/468-73-0x000000003F7D0000-0x000000003FC58000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4f9daccbc02a2fa0bcc5149af49dcef672fdf2683e9f5ab471a0aa633c386a27.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ errorResponder.exe -
Executes dropped EXE 1 IoCs
pid Process 468 errorResponder.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4f9daccbc02a2fa0bcc5149af49dcef672fdf2683e9f5ab471a0aa633c386a27.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4f9daccbc02a2fa0bcc5149af49dcef672fdf2683e9f5ab471a0aa633c386a27.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion errorResponder.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion errorResponder.exe -
Deletes itself 1 IoCs
pid Process 468 errorResponder.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Wine 4f9daccbc02a2fa0bcc5149af49dcef672fdf2683e9f5ab471a0aa633c386a27.exe Key opened \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Wine errorResponder.exe -
Loads dropped DLL 1 IoCs
pid Process 1700 4f9daccbc02a2fa0bcc5149af49dcef672fdf2683e9f5ab471a0aa633c386a27.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1700 4f9daccbc02a2fa0bcc5149af49dcef672fdf2683e9f5ab471a0aa633c386a27.exe 468 errorResponder.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1700 4f9daccbc02a2fa0bcc5149af49dcef672fdf2683e9f5ab471a0aa633c386a27.exe 468 errorResponder.exe 468 errorResponder.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1700 wrote to memory of 468 1700 4f9daccbc02a2fa0bcc5149af49dcef672fdf2683e9f5ab471a0aa633c386a27.exe 27 PID 1700 wrote to memory of 468 1700 4f9daccbc02a2fa0bcc5149af49dcef672fdf2683e9f5ab471a0aa633c386a27.exe 27 PID 1700 wrote to memory of 468 1700 4f9daccbc02a2fa0bcc5149af49dcef672fdf2683e9f5ab471a0aa633c386a27.exe 27 PID 1700 wrote to memory of 468 1700 4f9daccbc02a2fa0bcc5149af49dcef672fdf2683e9f5ab471a0aa633c386a27.exe 27 PID 1700 wrote to memory of 468 1700 4f9daccbc02a2fa0bcc5149af49dcef672fdf2683e9f5ab471a0aa633c386a27.exe 27 PID 1700 wrote to memory of 468 1700 4f9daccbc02a2fa0bcc5149af49dcef672fdf2683e9f5ab471a0aa633c386a27.exe 27 PID 1700 wrote to memory of 468 1700 4f9daccbc02a2fa0bcc5149af49dcef672fdf2683e9f5ab471a0aa633c386a27.exe 27 PID 468 wrote to memory of 748 468 errorResponder.exe 28 PID 468 wrote to memory of 748 468 errorResponder.exe 28 PID 468 wrote to memory of 748 468 errorResponder.exe 28 PID 468 wrote to memory of 748 468 errorResponder.exe 28 PID 468 wrote to memory of 748 468 errorResponder.exe 28 PID 468 wrote to memory of 748 468 errorResponder.exe 28 PID 468 wrote to memory of 748 468 errorResponder.exe 28 PID 468 wrote to memory of 748 468 errorResponder.exe 28 PID 468 wrote to memory of 748 468 errorResponder.exe 28 PID 468 wrote to memory of 748 468 errorResponder.exe 28 PID 468 wrote to memory of 748 468 errorResponder.exe 28 PID 468 wrote to memory of 748 468 errorResponder.exe 28 PID 468 wrote to memory of 748 468 errorResponder.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f9daccbc02a2fa0bcc5149af49dcef672fdf2683e9f5ab471a0aa633c386a27.exe"C:\Users\Admin\AppData\Local\Temp\4f9daccbc02a2fa0bcc5149af49dcef672fdf2683e9f5ab471a0aa633c386a27.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\ProgramData\ErrorResponder\errorResponder.exeC:\ProgramData\ErrorResponder\errorResponder.exe "C:\Users\Admin\AppData\Local\Temp\4f9daccbc02a2fa0bcc5149af49dcef672fdf2683e9f5ab471a0aa633c386a27.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Deletes itself
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\ErrorResponder\errorResponder.exe3⤵PID:748
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD529e83eb08c474cf1a86c910cb09ddf68
SHA13ff2d663dfd76dbeed99deb4136f1ec5f924e94f
SHA2564f9daccbc02a2fa0bcc5149af49dcef672fdf2683e9f5ab471a0aa633c386a27
SHA512bda8b5501954758dd3357124041aa1e66eda227181c47830b617d41097b1f4ba87733b1a4314726ebc952c94b25c9b07cacb10eb271e70c07b09265dd3a45bd3
-
Filesize
1.8MB
MD529e83eb08c474cf1a86c910cb09ddf68
SHA13ff2d663dfd76dbeed99deb4136f1ec5f924e94f
SHA2564f9daccbc02a2fa0bcc5149af49dcef672fdf2683e9f5ab471a0aa633c386a27
SHA512bda8b5501954758dd3357124041aa1e66eda227181c47830b617d41097b1f4ba87733b1a4314726ebc952c94b25c9b07cacb10eb271e70c07b09265dd3a45bd3
-
Filesize
1.8MB
MD529e83eb08c474cf1a86c910cb09ddf68
SHA13ff2d663dfd76dbeed99deb4136f1ec5f924e94f
SHA2564f9daccbc02a2fa0bcc5149af49dcef672fdf2683e9f5ab471a0aa633c386a27
SHA512bda8b5501954758dd3357124041aa1e66eda227181c47830b617d41097b1f4ba87733b1a4314726ebc952c94b25c9b07cacb10eb271e70c07b09265dd3a45bd3