Analysis
-
max time kernel
139s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
25-06-2022 11:11
Static task
static1
Behavioral task
behavioral1
Sample
3f5c2ca8320cbb82fc77e86eb0dc4bc208fddd20198cb5d65386f58ba7471421.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3f5c2ca8320cbb82fc77e86eb0dc4bc208fddd20198cb5d65386f58ba7471421.exe
Resource
win10v2004-20220414-en
General
-
Target
3f5c2ca8320cbb82fc77e86eb0dc4bc208fddd20198cb5d65386f58ba7471421.exe
-
Size
236KB
-
MD5
1c6713d0282f6723bc963c879fc8f7d2
-
SHA1
6c94575ba1d923b51cdba40ecc0553a33e766e23
-
SHA256
3f5c2ca8320cbb82fc77e86eb0dc4bc208fddd20198cb5d65386f58ba7471421
-
SHA512
24eefef37ebf1ea346a5b6a8420aa177a51667a304f1962fe3bdd0b8ee25664b6f2b7b0df15f6f29ea7b7c27f636b1f5cb9b4c31cfc0d14d43cfa48b4c6a8e61
Malware Config
Extracted
buer
https://gstatiknetiplist.cc/
https://gstatiknetiplist.com/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\ErrorResponder\\responder.exe\"" responder.exe -
resource yara_rule behavioral1/memory/1100-56-0x00000000001B0000-0x00000000001BA000-memory.dmp buer behavioral1/memory/1100-57-0x0000000040000000-0x0000000042824000-memory.dmp buer behavioral1/memory/1912-66-0x0000000040000000-0x0000000042824000-memory.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 1912 responder.exe -
Deletes itself 1 IoCs
pid Process 1912 responder.exe -
Loads dropped DLL 2 IoCs
pid Process 1100 3f5c2ca8320cbb82fc77e86eb0dc4bc208fddd20198cb5d65386f58ba7471421.exe 1100 3f5c2ca8320cbb82fc77e86eb0dc4bc208fddd20198cb5d65386f58ba7471421.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: responder.exe File opened (read-only) \??\J: responder.exe File opened (read-only) \??\K: responder.exe File opened (read-only) \??\N: responder.exe File opened (read-only) \??\O: responder.exe File opened (read-only) \??\V: responder.exe File opened (read-only) \??\E: responder.exe File opened (read-only) \??\H: responder.exe File opened (read-only) \??\L: responder.exe File opened (read-only) \??\M: responder.exe File opened (read-only) \??\S: responder.exe File opened (read-only) \??\W: responder.exe File opened (read-only) \??\Z: responder.exe File opened (read-only) \??\A: responder.exe File opened (read-only) \??\B: responder.exe File opened (read-only) \??\X: responder.exe File opened (read-only) \??\T: responder.exe File opened (read-only) \??\U: responder.exe File opened (read-only) \??\P: responder.exe File opened (read-only) \??\Q: responder.exe File opened (read-only) \??\R: responder.exe File opened (read-only) \??\Y: responder.exe File opened (read-only) \??\F: responder.exe File opened (read-only) \??\G: responder.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 388 1180 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1912 responder.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1100 wrote to memory of 1912 1100 3f5c2ca8320cbb82fc77e86eb0dc4bc208fddd20198cb5d65386f58ba7471421.exe 27 PID 1100 wrote to memory of 1912 1100 3f5c2ca8320cbb82fc77e86eb0dc4bc208fddd20198cb5d65386f58ba7471421.exe 27 PID 1100 wrote to memory of 1912 1100 3f5c2ca8320cbb82fc77e86eb0dc4bc208fddd20198cb5d65386f58ba7471421.exe 27 PID 1100 wrote to memory of 1912 1100 3f5c2ca8320cbb82fc77e86eb0dc4bc208fddd20198cb5d65386f58ba7471421.exe 27 PID 1912 wrote to memory of 1180 1912 responder.exe 28 PID 1912 wrote to memory of 1180 1912 responder.exe 28 PID 1912 wrote to memory of 1180 1912 responder.exe 28 PID 1912 wrote to memory of 1180 1912 responder.exe 28 PID 1912 wrote to memory of 1180 1912 responder.exe 28 PID 1912 wrote to memory of 1180 1912 responder.exe 28 PID 1912 wrote to memory of 1180 1912 responder.exe 28 PID 1912 wrote to memory of 1180 1912 responder.exe 28 PID 1912 wrote to memory of 1180 1912 responder.exe 28 PID 1912 wrote to memory of 1180 1912 responder.exe 28 PID 1912 wrote to memory of 1180 1912 responder.exe 28 PID 1180 wrote to memory of 388 1180 secinit.exe 29 PID 1180 wrote to memory of 388 1180 secinit.exe 29 PID 1180 wrote to memory of 388 1180 secinit.exe 29 PID 1180 wrote to memory of 388 1180 secinit.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f5c2ca8320cbb82fc77e86eb0dc4bc208fddd20198cb5d65386f58ba7471421.exe"C:\Users\Admin\AppData\Local\Temp\3f5c2ca8320cbb82fc77e86eb0dc4bc208fddd20198cb5d65386f58ba7471421.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\ProgramData\ErrorResponder\responder.exeC:\ProgramData\ErrorResponder\responder.exe "C:\Users\Admin\AppData\Local\Temp\3f5c2ca8320cbb82fc77e86eb0dc4bc208fddd20198cb5d65386f58ba7471421.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Deletes itself
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\ErrorResponder\responder.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1180 -s 1364⤵
- Program crash
PID:388
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
236KB
MD51c6713d0282f6723bc963c879fc8f7d2
SHA16c94575ba1d923b51cdba40ecc0553a33e766e23
SHA2563f5c2ca8320cbb82fc77e86eb0dc4bc208fddd20198cb5d65386f58ba7471421
SHA51224eefef37ebf1ea346a5b6a8420aa177a51667a304f1962fe3bdd0b8ee25664b6f2b7b0df15f6f29ea7b7c27f636b1f5cb9b4c31cfc0d14d43cfa48b4c6a8e61
-
Filesize
236KB
MD51c6713d0282f6723bc963c879fc8f7d2
SHA16c94575ba1d923b51cdba40ecc0553a33e766e23
SHA2563f5c2ca8320cbb82fc77e86eb0dc4bc208fddd20198cb5d65386f58ba7471421
SHA51224eefef37ebf1ea346a5b6a8420aa177a51667a304f1962fe3bdd0b8ee25664b6f2b7b0df15f6f29ea7b7c27f636b1f5cb9b4c31cfc0d14d43cfa48b4c6a8e61
-
Filesize
236KB
MD51c6713d0282f6723bc963c879fc8f7d2
SHA16c94575ba1d923b51cdba40ecc0553a33e766e23
SHA2563f5c2ca8320cbb82fc77e86eb0dc4bc208fddd20198cb5d65386f58ba7471421
SHA51224eefef37ebf1ea346a5b6a8420aa177a51667a304f1962fe3bdd0b8ee25664b6f2b7b0df15f6f29ea7b7c27f636b1f5cb9b4c31cfc0d14d43cfa48b4c6a8e61
-
Filesize
236KB
MD51c6713d0282f6723bc963c879fc8f7d2
SHA16c94575ba1d923b51cdba40ecc0553a33e766e23
SHA2563f5c2ca8320cbb82fc77e86eb0dc4bc208fddd20198cb5d65386f58ba7471421
SHA51224eefef37ebf1ea346a5b6a8420aa177a51667a304f1962fe3bdd0b8ee25664b6f2b7b0df15f6f29ea7b7c27f636b1f5cb9b4c31cfc0d14d43cfa48b4c6a8e61