Analysis
-
max time kernel
184s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-06-2022 11:10
Static task
static1
Behavioral task
behavioral1
Sample
cfb4266735f9806e94537f71a1e289ce6db041484159c07be6a8d5b3ce12abf9.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
cfb4266735f9806e94537f71a1e289ce6db041484159c07be6a8d5b3ce12abf9.exe
Resource
win10v2004-20220414-en
General
-
Target
cfb4266735f9806e94537f71a1e289ce6db041484159c07be6a8d5b3ce12abf9.exe
-
Size
212KB
-
MD5
a4d06844d2cb6555d28d7160044df583
-
SHA1
bb25fc9c6bd3b6260d05b03fffbec75e679a81a9
-
SHA256
cfb4266735f9806e94537f71a1e289ce6db041484159c07be6a8d5b3ce12abf9
-
SHA512
bf3dd5469cfe2093505373a3ce7d322b6057fa367462b55be43b173febf1021d66b430f98ad78a497d2db93244b8a4f739136e5e680c9d2706383151c899cfc1
Malware Config
Extracted
buer
https://95.217.81.68/
http://95.217.81.68:8080/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\ErrorResponder\\errorResponder.exe\"" errorResponder.exe -
resource yara_rule behavioral2/memory/3276-131-0x0000000000030000-0x000000000003A000-memory.dmp buer behavioral2/memory/3276-132-0x0000000040000000-0x00000000404A8000-memory.dmp buer behavioral2/memory/3276-134-0x0000000040000000-0x00000000404A8000-memory.dmp buer behavioral2/memory/2148-139-0x0000000040000000-0x00000000404A8000-memory.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 2148 errorResponder.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 4256 3276 WerFault.exe 77 4828 2044 WerFault.exe 82 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2148 errorResponder.exe 2148 errorResponder.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3276 wrote to memory of 2148 3276 cfb4266735f9806e94537f71a1e289ce6db041484159c07be6a8d5b3ce12abf9.exe 78 PID 3276 wrote to memory of 2148 3276 cfb4266735f9806e94537f71a1e289ce6db041484159c07be6a8d5b3ce12abf9.exe 78 PID 3276 wrote to memory of 2148 3276 cfb4266735f9806e94537f71a1e289ce6db041484159c07be6a8d5b3ce12abf9.exe 78 PID 2148 wrote to memory of 2044 2148 errorResponder.exe 82 PID 2148 wrote to memory of 2044 2148 errorResponder.exe 82 PID 2148 wrote to memory of 2044 2148 errorResponder.exe 82 PID 2148 wrote to memory of 2044 2148 errorResponder.exe 82 PID 2148 wrote to memory of 2044 2148 errorResponder.exe 82 PID 2148 wrote to memory of 2044 2148 errorResponder.exe 82 PID 2148 wrote to memory of 2044 2148 errorResponder.exe 82 PID 2148 wrote to memory of 2044 2148 errorResponder.exe 82 PID 2148 wrote to memory of 2044 2148 errorResponder.exe 82 PID 2148 wrote to memory of 2044 2148 errorResponder.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\cfb4266735f9806e94537f71a1e289ce6db041484159c07be6a8d5b3ce12abf9.exe"C:\Users\Admin\AppData\Local\Temp\cfb4266735f9806e94537f71a1e289ce6db041484159c07be6a8d5b3ce12abf9.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\ProgramData\ErrorResponder\errorResponder.exeC:\ProgramData\ErrorResponder\errorResponder.exe "C:\Users\Admin\AppData\Local\Temp\cfb4266735f9806e94537f71a1e289ce6db041484159c07be6a8d5b3ce12abf9.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\ErrorResponder\errorResponder.exe3⤵PID:2044
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 2204⤵
- Program crash
PID:4828
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3276 -s 4442⤵
- Program crash
PID:4256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 3276 -ip 32761⤵PID:3592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2044 -ip 20441⤵PID:2240
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD5a4d06844d2cb6555d28d7160044df583
SHA1bb25fc9c6bd3b6260d05b03fffbec75e679a81a9
SHA256cfb4266735f9806e94537f71a1e289ce6db041484159c07be6a8d5b3ce12abf9
SHA512bf3dd5469cfe2093505373a3ce7d322b6057fa367462b55be43b173febf1021d66b430f98ad78a497d2db93244b8a4f739136e5e680c9d2706383151c899cfc1
-
Filesize
212KB
MD5a4d06844d2cb6555d28d7160044df583
SHA1bb25fc9c6bd3b6260d05b03fffbec75e679a81a9
SHA256cfb4266735f9806e94537f71a1e289ce6db041484159c07be6a8d5b3ce12abf9
SHA512bf3dd5469cfe2093505373a3ce7d322b6057fa367462b55be43b173febf1021d66b430f98ad78a497d2db93244b8a4f739136e5e680c9d2706383151c899cfc1