Analysis

  • max time kernel
    139s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    25-06-2022 11:11

General

  • Target

    3f5c2ca8320cbb82fc77e86eb0dc4bc208fddd20198cb5d65386f58ba7471421.exe

  • Size

    236KB

  • MD5

    1c6713d0282f6723bc963c879fc8f7d2

  • SHA1

    6c94575ba1d923b51cdba40ecc0553a33e766e23

  • SHA256

    3f5c2ca8320cbb82fc77e86eb0dc4bc208fddd20198cb5d65386f58ba7471421

  • SHA512

    24eefef37ebf1ea346a5b6a8420aa177a51667a304f1962fe3bdd0b8ee25664b6f2b7b0df15f6f29ea7b7c27f636b1f5cb9b4c31cfc0d14d43cfa48b4c6a8e61

Score
10/10

Malware Config

Extracted

Family

buer

C2

https://gstatiknetiplist.cc/

https://gstatiknetiplist.com/

Signatures

  • Buer

    Buer is a new modular loader first seen in August 2019.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Buer Loader 3 IoCs

    Detects Buer loader in memory or disk.

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f5c2ca8320cbb82fc77e86eb0dc4bc208fddd20198cb5d65386f58ba7471421.exe
    "C:\Users\Admin\AppData\Local\Temp\3f5c2ca8320cbb82fc77e86eb0dc4bc208fddd20198cb5d65386f58ba7471421.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1100
    • C:\ProgramData\ErrorResponder\responder.exe
      C:\ProgramData\ErrorResponder\responder.exe "C:\Users\Admin\AppData\Local\Temp\3f5c2ca8320cbb82fc77e86eb0dc4bc208fddd20198cb5d65386f58ba7471421.exe" ensgJJ
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Deletes itself
      • Enumerates connected drives
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1912
      • C:\Windows\SysWOW64\secinit.exe
        C:\ProgramData\ErrorResponder\responder.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1180
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1180 -s 136
          4⤵
          • Program crash
          PID:388

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\ErrorResponder\responder.exe

    Filesize

    236KB

    MD5

    1c6713d0282f6723bc963c879fc8f7d2

    SHA1

    6c94575ba1d923b51cdba40ecc0553a33e766e23

    SHA256

    3f5c2ca8320cbb82fc77e86eb0dc4bc208fddd20198cb5d65386f58ba7471421

    SHA512

    24eefef37ebf1ea346a5b6a8420aa177a51667a304f1962fe3bdd0b8ee25664b6f2b7b0df15f6f29ea7b7c27f636b1f5cb9b4c31cfc0d14d43cfa48b4c6a8e61

  • C:\ProgramData\ErrorResponder\responder.exe

    Filesize

    236KB

    MD5

    1c6713d0282f6723bc963c879fc8f7d2

    SHA1

    6c94575ba1d923b51cdba40ecc0553a33e766e23

    SHA256

    3f5c2ca8320cbb82fc77e86eb0dc4bc208fddd20198cb5d65386f58ba7471421

    SHA512

    24eefef37ebf1ea346a5b6a8420aa177a51667a304f1962fe3bdd0b8ee25664b6f2b7b0df15f6f29ea7b7c27f636b1f5cb9b4c31cfc0d14d43cfa48b4c6a8e61

  • \ProgramData\ErrorResponder\responder.exe

    Filesize

    236KB

    MD5

    1c6713d0282f6723bc963c879fc8f7d2

    SHA1

    6c94575ba1d923b51cdba40ecc0553a33e766e23

    SHA256

    3f5c2ca8320cbb82fc77e86eb0dc4bc208fddd20198cb5d65386f58ba7471421

    SHA512

    24eefef37ebf1ea346a5b6a8420aa177a51667a304f1962fe3bdd0b8ee25664b6f2b7b0df15f6f29ea7b7c27f636b1f5cb9b4c31cfc0d14d43cfa48b4c6a8e61

  • \ProgramData\ErrorResponder\responder.exe

    Filesize

    236KB

    MD5

    1c6713d0282f6723bc963c879fc8f7d2

    SHA1

    6c94575ba1d923b51cdba40ecc0553a33e766e23

    SHA256

    3f5c2ca8320cbb82fc77e86eb0dc4bc208fddd20198cb5d65386f58ba7471421

    SHA512

    24eefef37ebf1ea346a5b6a8420aa177a51667a304f1962fe3bdd0b8ee25664b6f2b7b0df15f6f29ea7b7c27f636b1f5cb9b4c31cfc0d14d43cfa48b4c6a8e61

  • memory/1100-62-0x000000000030B000-0x0000000000313000-memory.dmp

    Filesize

    32KB

  • memory/1100-54-0x0000000074B51000-0x0000000074B53000-memory.dmp

    Filesize

    8KB

  • memory/1100-57-0x0000000040000000-0x0000000042824000-memory.dmp

    Filesize

    40.1MB

  • memory/1100-55-0x000000000030B000-0x0000000000313000-memory.dmp

    Filesize

    32KB

  • memory/1100-56-0x00000000001B0000-0x00000000001BA000-memory.dmp

    Filesize

    40KB

  • memory/1180-80-0x0000000000750000-0x0000000002F74000-memory.dmp

    Filesize

    40.1MB

  • memory/1180-67-0x0000000000750000-0x0000000002F74000-memory.dmp

    Filesize

    40.1MB

  • memory/1180-68-0x0000000000750000-0x0000000002F74000-memory.dmp

    Filesize

    40.1MB

  • memory/1180-70-0x0000000000750000-0x0000000002F74000-memory.dmp

    Filesize

    40.1MB

  • memory/1180-72-0x0000000000750000-0x0000000002F74000-memory.dmp

    Filesize

    40.1MB

  • memory/1180-74-0x0000000000750000-0x0000000002F74000-memory.dmp

    Filesize

    40.1MB

  • memory/1180-76-0x0000000000080000-0x0000000000081000-memory.dmp

    Filesize

    4KB

  • memory/1912-66-0x0000000040000000-0x0000000042824000-memory.dmp

    Filesize

    40.1MB

  • memory/1912-65-0x00000000002EB000-0x00000000002F3000-memory.dmp

    Filesize

    32KB