Analysis
-
max time kernel
147s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-07-2022 17:20
Static task
static1
Behavioral task
behavioral1
Sample
2d0454cf4f68e1d60a1a0fcc15092f2d4948ea0b849003ec1950726ce66e89db.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
2d0454cf4f68e1d60a1a0fcc15092f2d4948ea0b849003ec1950726ce66e89db.exe
Resource
win10v2004-20220414-en
General
-
Target
2d0454cf4f68e1d60a1a0fcc15092f2d4948ea0b849003ec1950726ce66e89db.exe
-
Size
1.7MB
-
MD5
4f73059dff7c802ba913d7829486ea61
-
SHA1
e9ea29c2ca2cdc156b624c8001eeb62d508958b7
-
SHA256
2d0454cf4f68e1d60a1a0fcc15092f2d4948ea0b849003ec1950726ce66e89db
-
SHA512
a15ee3950e35af46dcbe4751a493d3f07f0194b04057ee2ab1687679f5a0a44672b0efe6845faa3315a79146f5e75390f0e11bfa739dabc048f9e710ba4902ce
Malware Config
Extracted
buer
http://bbload01.top/
http://bbload02.top/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\ErrorResponder\\errorResponder.exe\"" errorResponder.exe -
resource yara_rule behavioral1/memory/1800-58-0x000000003F7D0000-0x000000003FC1F000-memory.dmp buer behavioral1/memory/1800-59-0x000000003F7D0000-0x000000003FC1F000-memory.dmp buer behavioral1/memory/1800-63-0x000000003F7D0000-0x000000003FC1F000-memory.dmp buer behavioral1/memory/1800-68-0x000000003F7D0000-0x000000003FC1F000-memory.dmp buer behavioral1/memory/776-78-0x000000003FCD0000-0x000000004011F000-memory.dmp buer behavioral1/memory/776-80-0x000000003FCD0000-0x000000004011F000-memory.dmp buer behavioral1/memory/776-81-0x000000003FCD0000-0x000000004011F000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2d0454cf4f68e1d60a1a0fcc15092f2d4948ea0b849003ec1950726ce66e89db.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ errorResponder.exe -
Executes dropped EXE 1 IoCs
pid Process 776 errorResponder.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2d0454cf4f68e1d60a1a0fcc15092f2d4948ea0b849003ec1950726ce66e89db.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2d0454cf4f68e1d60a1a0fcc15092f2d4948ea0b849003ec1950726ce66e89db.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion errorResponder.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion errorResponder.exe -
Deletes itself 1 IoCs
pid Process 776 errorResponder.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Wine 2d0454cf4f68e1d60a1a0fcc15092f2d4948ea0b849003ec1950726ce66e89db.exe Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Wine errorResponder.exe -
Loads dropped DLL 4 IoCs
pid Process 1800 2d0454cf4f68e1d60a1a0fcc15092f2d4948ea0b849003ec1950726ce66e89db.exe 776 errorResponder.exe 776 errorResponder.exe 776 errorResponder.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1800 2d0454cf4f68e1d60a1a0fcc15092f2d4948ea0b849003ec1950726ce66e89db.exe 776 errorResponder.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1800 2d0454cf4f68e1d60a1a0fcc15092f2d4948ea0b849003ec1950726ce66e89db.exe 776 errorResponder.exe 776 errorResponder.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1800 wrote to memory of 776 1800 2d0454cf4f68e1d60a1a0fcc15092f2d4948ea0b849003ec1950726ce66e89db.exe 27 PID 1800 wrote to memory of 776 1800 2d0454cf4f68e1d60a1a0fcc15092f2d4948ea0b849003ec1950726ce66e89db.exe 27 PID 1800 wrote to memory of 776 1800 2d0454cf4f68e1d60a1a0fcc15092f2d4948ea0b849003ec1950726ce66e89db.exe 27 PID 1800 wrote to memory of 776 1800 2d0454cf4f68e1d60a1a0fcc15092f2d4948ea0b849003ec1950726ce66e89db.exe 27 PID 1800 wrote to memory of 776 1800 2d0454cf4f68e1d60a1a0fcc15092f2d4948ea0b849003ec1950726ce66e89db.exe 27 PID 1800 wrote to memory of 776 1800 2d0454cf4f68e1d60a1a0fcc15092f2d4948ea0b849003ec1950726ce66e89db.exe 27 PID 1800 wrote to memory of 776 1800 2d0454cf4f68e1d60a1a0fcc15092f2d4948ea0b849003ec1950726ce66e89db.exe 27 PID 776 wrote to memory of 840 776 errorResponder.exe 28 PID 776 wrote to memory of 840 776 errorResponder.exe 28 PID 776 wrote to memory of 840 776 errorResponder.exe 28 PID 776 wrote to memory of 840 776 errorResponder.exe 28 PID 776 wrote to memory of 840 776 errorResponder.exe 28 PID 776 wrote to memory of 840 776 errorResponder.exe 28 PID 776 wrote to memory of 840 776 errorResponder.exe 28 PID 776 wrote to memory of 840 776 errorResponder.exe 28 PID 776 wrote to memory of 840 776 errorResponder.exe 28 PID 776 wrote to memory of 840 776 errorResponder.exe 28 PID 776 wrote to memory of 840 776 errorResponder.exe 28 PID 776 wrote to memory of 840 776 errorResponder.exe 28 PID 776 wrote to memory of 840 776 errorResponder.exe 28 PID 776 wrote to memory of 840 776 errorResponder.exe 28 PID 776 wrote to memory of 840 776 errorResponder.exe 28 PID 776 wrote to memory of 840 776 errorResponder.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d0454cf4f68e1d60a1a0fcc15092f2d4948ea0b849003ec1950726ce66e89db.exe"C:\Users\Admin\AppData\Local\Temp\2d0454cf4f68e1d60a1a0fcc15092f2d4948ea0b849003ec1950726ce66e89db.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\ProgramData\ErrorResponder\errorResponder.exeC:\ProgramData\ErrorResponder\errorResponder.exe "C:\Users\Admin\AppData\Local\Temp\2d0454cf4f68e1d60a1a0fcc15092f2d4948ea0b849003ec1950726ce66e89db.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Deletes itself
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\ErrorResponder\errorResponder.exe3⤵PID:840
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD54f73059dff7c802ba913d7829486ea61
SHA1e9ea29c2ca2cdc156b624c8001eeb62d508958b7
SHA2562d0454cf4f68e1d60a1a0fcc15092f2d4948ea0b849003ec1950726ce66e89db
SHA512a15ee3950e35af46dcbe4751a493d3f07f0194b04057ee2ab1687679f5a0a44672b0efe6845faa3315a79146f5e75390f0e11bfa739dabc048f9e710ba4902ce
-
Filesize
1.7MB
MD54f73059dff7c802ba913d7829486ea61
SHA1e9ea29c2ca2cdc156b624c8001eeb62d508958b7
SHA2562d0454cf4f68e1d60a1a0fcc15092f2d4948ea0b849003ec1950726ce66e89db
SHA512a15ee3950e35af46dcbe4751a493d3f07f0194b04057ee2ab1687679f5a0a44672b0efe6845faa3315a79146f5e75390f0e11bfa739dabc048f9e710ba4902ce
-
Filesize
1.7MB
MD54f73059dff7c802ba913d7829486ea61
SHA1e9ea29c2ca2cdc156b624c8001eeb62d508958b7
SHA2562d0454cf4f68e1d60a1a0fcc15092f2d4948ea0b849003ec1950726ce66e89db
SHA512a15ee3950e35af46dcbe4751a493d3f07f0194b04057ee2ab1687679f5a0a44672b0efe6845faa3315a79146f5e75390f0e11bfa739dabc048f9e710ba4902ce
-
Filesize
1.7MB
MD54f73059dff7c802ba913d7829486ea61
SHA1e9ea29c2ca2cdc156b624c8001eeb62d508958b7
SHA2562d0454cf4f68e1d60a1a0fcc15092f2d4948ea0b849003ec1950726ce66e89db
SHA512a15ee3950e35af46dcbe4751a493d3f07f0194b04057ee2ab1687679f5a0a44672b0efe6845faa3315a79146f5e75390f0e11bfa739dabc048f9e710ba4902ce
-
Filesize
1.7MB
MD54f73059dff7c802ba913d7829486ea61
SHA1e9ea29c2ca2cdc156b624c8001eeb62d508958b7
SHA2562d0454cf4f68e1d60a1a0fcc15092f2d4948ea0b849003ec1950726ce66e89db
SHA512a15ee3950e35af46dcbe4751a493d3f07f0194b04057ee2ab1687679f5a0a44672b0efe6845faa3315a79146f5e75390f0e11bfa739dabc048f9e710ba4902ce
-
Filesize
1.7MB
MD54f73059dff7c802ba913d7829486ea61
SHA1e9ea29c2ca2cdc156b624c8001eeb62d508958b7
SHA2562d0454cf4f68e1d60a1a0fcc15092f2d4948ea0b849003ec1950726ce66e89db
SHA512a15ee3950e35af46dcbe4751a493d3f07f0194b04057ee2ab1687679f5a0a44672b0efe6845faa3315a79146f5e75390f0e11bfa739dabc048f9e710ba4902ce