Analysis
-
max time kernel
189s -
max time network
195s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 11:10
Static task
static1
Behavioral task
behavioral1
Sample
cfb4266735f9806e94537f71a1e289ce6db041484159c07be6a8d5b3ce12abf9.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
cfb4266735f9806e94537f71a1e289ce6db041484159c07be6a8d5b3ce12abf9.exe
Resource
win10v2004-20220414-en
General
-
Target
cfb4266735f9806e94537f71a1e289ce6db041484159c07be6a8d5b3ce12abf9.exe
-
Size
212KB
-
MD5
a4d06844d2cb6555d28d7160044df583
-
SHA1
bb25fc9c6bd3b6260d05b03fffbec75e679a81a9
-
SHA256
cfb4266735f9806e94537f71a1e289ce6db041484159c07be6a8d5b3ce12abf9
-
SHA512
bf3dd5469cfe2093505373a3ce7d322b6057fa367462b55be43b173febf1021d66b430f98ad78a497d2db93244b8a4f739136e5e680c9d2706383151c899cfc1
Malware Config
Extracted
buer
https://95.217.81.68/
http://95.217.81.68:8080/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\ErrorResponder\\errorResponder.exe\"" errorResponder.exe -
resource yara_rule behavioral1/memory/1260-56-0x0000000000020000-0x000000000002A000-memory.dmp buer behavioral1/memory/1260-57-0x0000000040000000-0x00000000404A8000-memory.dmp buer behavioral1/memory/2028-66-0x0000000040000000-0x00000000404A8000-memory.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 2028 errorResponder.exe -
Deletes itself 1 IoCs
pid Process 2028 errorResponder.exe -
Loads dropped DLL 2 IoCs
pid Process 1260 cfb4266735f9806e94537f71a1e289ce6db041484159c07be6a8d5b3ce12abf9.exe 1260 cfb4266735f9806e94537f71a1e289ce6db041484159c07be6a8d5b3ce12abf9.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1924 1200 WerFault.exe 29 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2028 errorResponder.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1260 wrote to memory of 2028 1260 cfb4266735f9806e94537f71a1e289ce6db041484159c07be6a8d5b3ce12abf9.exe 28 PID 1260 wrote to memory of 2028 1260 cfb4266735f9806e94537f71a1e289ce6db041484159c07be6a8d5b3ce12abf9.exe 28 PID 1260 wrote to memory of 2028 1260 cfb4266735f9806e94537f71a1e289ce6db041484159c07be6a8d5b3ce12abf9.exe 28 PID 1260 wrote to memory of 2028 1260 cfb4266735f9806e94537f71a1e289ce6db041484159c07be6a8d5b3ce12abf9.exe 28 PID 2028 wrote to memory of 1200 2028 errorResponder.exe 29 PID 2028 wrote to memory of 1200 2028 errorResponder.exe 29 PID 2028 wrote to memory of 1200 2028 errorResponder.exe 29 PID 2028 wrote to memory of 1200 2028 errorResponder.exe 29 PID 2028 wrote to memory of 1200 2028 errorResponder.exe 29 PID 2028 wrote to memory of 1200 2028 errorResponder.exe 29 PID 2028 wrote to memory of 1200 2028 errorResponder.exe 29 PID 2028 wrote to memory of 1200 2028 errorResponder.exe 29 PID 2028 wrote to memory of 1200 2028 errorResponder.exe 29 PID 2028 wrote to memory of 1200 2028 errorResponder.exe 29 PID 2028 wrote to memory of 1200 2028 errorResponder.exe 29 PID 1200 wrote to memory of 1924 1200 secinit.exe 30 PID 1200 wrote to memory of 1924 1200 secinit.exe 30 PID 1200 wrote to memory of 1924 1200 secinit.exe 30 PID 1200 wrote to memory of 1924 1200 secinit.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\cfb4266735f9806e94537f71a1e289ce6db041484159c07be6a8d5b3ce12abf9.exe"C:\Users\Admin\AppData\Local\Temp\cfb4266735f9806e94537f71a1e289ce6db041484159c07be6a8d5b3ce12abf9.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\ProgramData\ErrorResponder\errorResponder.exeC:\ProgramData\ErrorResponder\errorResponder.exe "C:\Users\Admin\AppData\Local\Temp\cfb4266735f9806e94537f71a1e289ce6db041484159c07be6a8d5b3ce12abf9.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\ErrorResponder\errorResponder.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1200 -s 1364⤵
- Program crash
PID:1924
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD5a4d06844d2cb6555d28d7160044df583
SHA1bb25fc9c6bd3b6260d05b03fffbec75e679a81a9
SHA256cfb4266735f9806e94537f71a1e289ce6db041484159c07be6a8d5b3ce12abf9
SHA512bf3dd5469cfe2093505373a3ce7d322b6057fa367462b55be43b173febf1021d66b430f98ad78a497d2db93244b8a4f739136e5e680c9d2706383151c899cfc1
-
Filesize
212KB
MD5a4d06844d2cb6555d28d7160044df583
SHA1bb25fc9c6bd3b6260d05b03fffbec75e679a81a9
SHA256cfb4266735f9806e94537f71a1e289ce6db041484159c07be6a8d5b3ce12abf9
SHA512bf3dd5469cfe2093505373a3ce7d322b6057fa367462b55be43b173febf1021d66b430f98ad78a497d2db93244b8a4f739136e5e680c9d2706383151c899cfc1
-
Filesize
212KB
MD5a4d06844d2cb6555d28d7160044df583
SHA1bb25fc9c6bd3b6260d05b03fffbec75e679a81a9
SHA256cfb4266735f9806e94537f71a1e289ce6db041484159c07be6a8d5b3ce12abf9
SHA512bf3dd5469cfe2093505373a3ce7d322b6057fa367462b55be43b173febf1021d66b430f98ad78a497d2db93244b8a4f739136e5e680c9d2706383151c899cfc1
-
Filesize
212KB
MD5a4d06844d2cb6555d28d7160044df583
SHA1bb25fc9c6bd3b6260d05b03fffbec75e679a81a9
SHA256cfb4266735f9806e94537f71a1e289ce6db041484159c07be6a8d5b3ce12abf9
SHA512bf3dd5469cfe2093505373a3ce7d322b6057fa367462b55be43b173febf1021d66b430f98ad78a497d2db93244b8a4f739136e5e680c9d2706383151c899cfc1