Analysis
-
max time kernel
151s -
max time network
169s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-07-2022 20:19
Static task
static1
Behavioral task
behavioral1
Sample
44ecc8efe07d1908dad842bd31f0aa15bb8810401829bc0b3383e2c0d9750bd2.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
44ecc8efe07d1908dad842bd31f0aa15bb8810401829bc0b3383e2c0d9750bd2.exe
Resource
win10v2004-20220414-en
General
-
Target
44ecc8efe07d1908dad842bd31f0aa15bb8810401829bc0b3383e2c0d9750bd2.exe
-
Size
1.8MB
-
MD5
12879fe44a82eb3491d7e04ed821a740
-
SHA1
8984616aade39197467c89cb08b1b42345acbed4
-
SHA256
44ecc8efe07d1908dad842bd31f0aa15bb8810401829bc0b3383e2c0d9750bd2
-
SHA512
8110746c6db6169a836d5f8c2f231a6b862cf878b9c1af5625770cb050fa86b2efa64614313783deb3d26f6533f90ed284a158b9f97f139cd920c715a07cb6b6
Malware Config
Extracted
buer
http://bbload01.top/
http://bbload02.top/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\ErrorResponder\\errorResponder.exe\"" errorResponder.exe -
resource yara_rule behavioral1/memory/888-57-0x000000003FD00000-0x000000004015E000-memory.dmp buer behavioral1/memory/888-58-0x000000003FD00000-0x000000004015E000-memory.dmp buer behavioral1/memory/888-60-0x000000003FD00000-0x000000004015E000-memory.dmp buer behavioral1/memory/888-62-0x00000000048E0000-0x0000000004D3E000-memory.dmp buer behavioral1/memory/888-65-0x000000003FD00000-0x000000004015E000-memory.dmp buer behavioral1/memory/992-70-0x0000000077100000-0x0000000077280000-memory.dmp buer behavioral1/memory/992-71-0x000000003FC10000-0x000000004006E000-memory.dmp buer behavioral1/memory/992-72-0x000000003FC10000-0x000000004006E000-memory.dmp buer behavioral1/memory/992-74-0x000000003FC10000-0x000000004006E000-memory.dmp buer -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 44ecc8efe07d1908dad842bd31f0aa15bb8810401829bc0b3383e2c0d9750bd2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ errorResponder.exe -
Executes dropped EXE 1 IoCs
pid Process 992 errorResponder.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion errorResponder.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 44ecc8efe07d1908dad842bd31f0aa15bb8810401829bc0b3383e2c0d9750bd2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 44ecc8efe07d1908dad842bd31f0aa15bb8810401829bc0b3383e2c0d9750bd2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion errorResponder.exe -
Deletes itself 1 IoCs
pid Process 992 errorResponder.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Wine 44ecc8efe07d1908dad842bd31f0aa15bb8810401829bc0b3383e2c0d9750bd2.exe Key opened \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Wine errorResponder.exe -
Loads dropped DLL 1 IoCs
pid Process 888 44ecc8efe07d1908dad842bd31f0aa15bb8810401829bc0b3383e2c0d9750bd2.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 888 44ecc8efe07d1908dad842bd31f0aa15bb8810401829bc0b3383e2c0d9750bd2.exe 992 errorResponder.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 888 44ecc8efe07d1908dad842bd31f0aa15bb8810401829bc0b3383e2c0d9750bd2.exe 992 errorResponder.exe 992 errorResponder.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 888 wrote to memory of 992 888 44ecc8efe07d1908dad842bd31f0aa15bb8810401829bc0b3383e2c0d9750bd2.exe 27 PID 888 wrote to memory of 992 888 44ecc8efe07d1908dad842bd31f0aa15bb8810401829bc0b3383e2c0d9750bd2.exe 27 PID 888 wrote to memory of 992 888 44ecc8efe07d1908dad842bd31f0aa15bb8810401829bc0b3383e2c0d9750bd2.exe 27 PID 888 wrote to memory of 992 888 44ecc8efe07d1908dad842bd31f0aa15bb8810401829bc0b3383e2c0d9750bd2.exe 27 PID 888 wrote to memory of 992 888 44ecc8efe07d1908dad842bd31f0aa15bb8810401829bc0b3383e2c0d9750bd2.exe 27 PID 888 wrote to memory of 992 888 44ecc8efe07d1908dad842bd31f0aa15bb8810401829bc0b3383e2c0d9750bd2.exe 27 PID 888 wrote to memory of 992 888 44ecc8efe07d1908dad842bd31f0aa15bb8810401829bc0b3383e2c0d9750bd2.exe 27 PID 992 wrote to memory of 1336 992 errorResponder.exe 28 PID 992 wrote to memory of 1336 992 errorResponder.exe 28 PID 992 wrote to memory of 1336 992 errorResponder.exe 28 PID 992 wrote to memory of 1336 992 errorResponder.exe 28 PID 992 wrote to memory of 1336 992 errorResponder.exe 28 PID 992 wrote to memory of 1336 992 errorResponder.exe 28 PID 992 wrote to memory of 1336 992 errorResponder.exe 28 PID 992 wrote to memory of 1336 992 errorResponder.exe 28 PID 992 wrote to memory of 1336 992 errorResponder.exe 28 PID 992 wrote to memory of 1336 992 errorResponder.exe 28 PID 992 wrote to memory of 1336 992 errorResponder.exe 28 PID 992 wrote to memory of 1336 992 errorResponder.exe 28 PID 992 wrote to memory of 1336 992 errorResponder.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\44ecc8efe07d1908dad842bd31f0aa15bb8810401829bc0b3383e2c0d9750bd2.exe"C:\Users\Admin\AppData\Local\Temp\44ecc8efe07d1908dad842bd31f0aa15bb8810401829bc0b3383e2c0d9750bd2.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:888 -
C:\ProgramData\ErrorResponder\errorResponder.exeC:\ProgramData\ErrorResponder\errorResponder.exe "C:\Users\Admin\AppData\Local\Temp\44ecc8efe07d1908dad842bd31f0aa15bb8810401829bc0b3383e2c0d9750bd2.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Deletes itself
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\ErrorResponder\errorResponder.exe3⤵PID:1336
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD512879fe44a82eb3491d7e04ed821a740
SHA18984616aade39197467c89cb08b1b42345acbed4
SHA25644ecc8efe07d1908dad842bd31f0aa15bb8810401829bc0b3383e2c0d9750bd2
SHA5128110746c6db6169a836d5f8c2f231a6b862cf878b9c1af5625770cb050fa86b2efa64614313783deb3d26f6533f90ed284a158b9f97f139cd920c715a07cb6b6
-
Filesize
1.8MB
MD512879fe44a82eb3491d7e04ed821a740
SHA18984616aade39197467c89cb08b1b42345acbed4
SHA25644ecc8efe07d1908dad842bd31f0aa15bb8810401829bc0b3383e2c0d9750bd2
SHA5128110746c6db6169a836d5f8c2f231a6b862cf878b9c1af5625770cb050fa86b2efa64614313783deb3d26f6533f90ed284a158b9f97f139cd920c715a07cb6b6
-
Filesize
1.8MB
MD512879fe44a82eb3491d7e04ed821a740
SHA18984616aade39197467c89cb08b1b42345acbed4
SHA25644ecc8efe07d1908dad842bd31f0aa15bb8810401829bc0b3383e2c0d9750bd2
SHA5128110746c6db6169a836d5f8c2f231a6b862cf878b9c1af5625770cb050fa86b2efa64614313783deb3d26f6533f90ed284a158b9f97f139cd920c715a07cb6b6