Analysis

  • max time kernel
    151s
  • max time network
    112s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    03-12-2020 07:47

General

  • Target

    313f90db50cc3d4164b90d648b83cd75.exe

  • Size

    671KB

  • MD5

    313f90db50cc3d4164b90d648b83cd75

  • SHA1

    f861f285705a4eb7ef51de27baef8dae05c36e15

  • SHA256

    69057a29d94d0ae3e51c435df396178b093d057db5addcdb273dcd5aedc6e1ef

  • SHA512

    cb0acb7106a328a83848812e85d7f998e5c0ef0780b4f0c20ab33cf046053202c265c40d7f68ee156d2ad4f80c114529ef8d8e793302d45991337a5cf37d1546

Malware Config

Signatures

  • CryptBot

    A C++ stealer distributed widely in bundle with other software.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Detected Stratum cryptominer command

    Looks to be attempting to contact Stratum mining pool.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • XMRig Miner Payload 4 IoCs
  • Blocklisted process makes network request 5 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 15 IoCs
  • Checks BIOS information in registry 2 TTPs 10 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Drops startup file 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 5 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 49 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 3 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 17 IoCs
  • Suspicious use of SendNotifyMessage 15 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\313f90db50cc3d4164b90d648b83cd75.exe
    "C:\Users\Admin\AppData\Local\Temp\313f90db50cc3d4164b90d648b83cd75.exe"
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1408
    • C:\Users\Admin\AppData\Local\Temp\File2.exe
      "C:\Users\Admin\AppData\Local\Temp\File2.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:308
      • C:\Program Files (x86)\solfer\boleroh\lvfuk.exe
        "C:\Program Files (x86)\solfer\boleroh\lvfuk.exe"
        3⤵
        • Executes dropped EXE
        • Checks BIOS information in registry
        • Identifies Wine through registry keys
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Checks processor information in registry
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        PID:564
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\ssoujhvp.exe"
          4⤵
          • Loads dropped DLL
          PID:2788
          • C:\Users\Admin\AppData\Local\Temp\ssoujhvp.exe
            "C:\Users\Admin\AppData\Local\Temp\ssoujhvp.exe"
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            PID:2820
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\SSOUJH~1.DLL,Z C:\Users\Admin\AppData\Local\Temp\ssoujhvp.exe
              6⤵
              • Loads dropped DLL
              PID:2904
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\rjoviybjtpkn.vbs"
          4⤵
            PID:2800
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\rjoviybjtpkn.vbs"
              5⤵
              • Blocklisted process makes network request
              • Modifies system certificate store
              PID:2880
        • C:\Program Files (x86)\solfer\6las.exe
          "C:\Program Files (x86)\solfer\6las.exe"
          3⤵
          • Executes dropped EXE
          • Checks BIOS information in registry
          • Identifies Wine through registry keys
          • Loads dropped DLL
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:748
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\ebxahtgsydywp & timeout 2 & del /f /q "C:\Program Files (x86)\solfer\6las.exe"
            4⤵
              PID:2492
              • C:\Windows\SysWOW64\timeout.exe
                timeout 2
                5⤵
                • Delays execution with timeout.exe
                PID:2576
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\ebxahtgsydywp & timeout 2 & del /f /q "C:\Program Files (x86)\solfer\6las.exe"
              4⤵
                PID:2536
                • C:\Windows\SysWOW64\timeout.exe
                  timeout 2
                  5⤵
                  • Delays execution with timeout.exe
                  PID:2624
            • C:\Program Files (x86)\solfer\4ger.exe
              "C:\Program Files (x86)\solfer\4ger.exe"
              3⤵
              • Executes dropped EXE
              • Checks BIOS information in registry
              • Drops startup file
              • Identifies Wine through registry keys
              • Loads dropped DLL
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:820
              • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
                "C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"
                4⤵
                • Executes dropped EXE
                • Checks BIOS information in registry
                • Identifies Wine through registry keys
                • Loads dropped DLL
                • Suspicious use of NtSetInformationThreadHideFromDebugger
                • Suspicious behavior: AddClipboardFormatListener
                • Suspicious behavior: EnumeratesProcesses
                PID:2228
            • C:\Program Files (x86)\solfer\startveu.exe
              "C:\Program Files (x86)\solfer\startveu.exe"
              3⤵
              • Executes dropped EXE
              • Checks BIOS information in registry
              • Identifies Wine through registry keys
              • Loads dropped DLL
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:2144
              • C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt
                C:\Users\Admin\AppData\Local\Temp\CL_Debug_Log.txt e -p"JDQJndnqwdnqw2139dn21n3b312idDQDB" "C:\Users\Admin\AppData\Local\Temp\CR_Debug_Log.txt" -o"C:\Users\Admin\AppData\Local\Temp\"
                4⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                PID:2524
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"
                4⤵
                  PID:2660
                  • C:\Windows\SysWOW64\schtasks.exe
                    schtasks.exe /Create /XML "C:\Users\Admin\AppData\Local\Temp\SystemCheck.xml" /TN "System\SystemCheck"
                    5⤵
                    • Creates scheduled task(s)
                    PID:2688
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\UQVNKLsrA5 & timeout 2 & del /f /q "C:\Users\Admin\AppData\Local\Temp\313f90db50cc3d4164b90d648b83cd75.exe"
              2⤵
              • Deletes itself
              • Suspicious use of WriteProcessMemory
              PID:980
              • C:\Windows\SysWOW64\timeout.exe
                timeout 2
                3⤵
                • Delays execution with timeout.exe
                PID:1080
          • C:\Windows\system32\taskeng.exe
            taskeng.exe {AB1A6BCA-77F6-4920-B2E3-BE6DE820EC51} S-1-5-21-3825035466-2522850611-591511364-1000:EIDQHRRL\Admin:Interactive:[1]
            1⤵
              PID:2944
              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
                C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe -SystemCheck
                2⤵
                • Executes dropped EXE
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                PID:2988
              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
                C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe -SystemCheck
                2⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: GetForegroundWindowSpam
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                PID:2980
                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
                  7z e -p"DxSqsNKKOxqPrM4Y3xeK" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor.tmp" -o"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\"
                  3⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:3016
                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\tor.exe
                  "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Tor\tor.exe" -f TorConfig
                  3⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1368
                • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
                  7z e -p"DxSqsNKKOxqPrM4Y3xeK" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SysBackup.tmp" -o"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\"
                  3⤵
                  • Executes dropped EXE
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2844
                • C:\Windows\SysWOW64\attrib.exe
                  -o stratum+tcp://Nipan.hk:8888 -u 0001 -p x -t 1
                  3⤵
                  • Suspicious use of AdjustPrivilegeToken
                  • Views/modifies file attributes
                  PID:280
              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
                C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe -SystemCheck
                2⤵
                • Executes dropped EXE
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                PID:2680
              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe
                C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Helper.exe -SystemCheck
                2⤵
                • Executes dropped EXE
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                PID:2664

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/280-671-0x0000000000400000-0x0000000000B59000-memory.dmp

              Filesize

              7.3MB

            • memory/280-670-0x0000000000400000-0x0000000000B59000-memory.dmp

              Filesize

              7.3MB

            • memory/280-668-0x0000000000400000-0x0000000000B59000-memory.dmp

              Filesize

              7.3MB

            • memory/564-40-0x0000000004540000-0x0000000004551000-memory.dmp

              Filesize

              68KB

            • memory/564-42-0x0000000004950000-0x0000000004961000-memory.dmp

              Filesize

              68KB

            • memory/748-53-0x0000000004E40000-0x0000000004E51000-memory.dmp

              Filesize

              68KB

            • memory/748-52-0x0000000004A30000-0x0000000004A41000-memory.dmp

              Filesize

              68KB

            • memory/820-50-0x0000000004B60000-0x0000000004B71000-memory.dmp

              Filesize

              68KB

            • memory/820-51-0x0000000004F70000-0x0000000004F81000-memory.dmp

              Filesize

              68KB

            • memory/1368-143-0x0000000003200000-0x0000000003211000-memory.dmp

              Filesize

              68KB

            • memory/1368-311-0x0000000002DF0000-0x0000000002E01000-memory.dmp

              Filesize

              68KB

            • memory/1368-360-0x0000000003C00000-0x0000000003C11000-memory.dmp

              Filesize

              68KB

            • memory/1368-361-0x00000000037F0000-0x0000000003801000-memory.dmp

              Filesize

              68KB

            • memory/1368-310-0x0000000003200000-0x0000000003211000-memory.dmp

              Filesize

              68KB

            • memory/1368-141-0x0000000064B40000-0x0000000064BBE000-memory.dmp

              Filesize

              504KB

            • memory/1368-309-0x0000000002DF0000-0x0000000002E01000-memory.dmp

              Filesize

              68KB

            • memory/1368-142-0x0000000002DF0000-0x0000000002E01000-memory.dmp

              Filesize

              68KB

            • memory/1368-144-0x0000000002DF0000-0x0000000002E01000-memory.dmp

              Filesize

              68KB

            • memory/1368-359-0x00000000037F0000-0x0000000003801000-memory.dmp

              Filesize

              68KB

            • memory/1408-2-0x0000000002580000-0x0000000002591000-memory.dmp

              Filesize

              68KB

            • memory/1408-3-0x0000000002780000-0x0000000002781000-memory.dmp

              Filesize

              4KB

            • memory/1724-4-0x000007FEF6680000-0x000007FEF68FA000-memory.dmp

              Filesize

              2.5MB

            • memory/2144-72-0x000000000B1C0000-0x000000000B1D1000-memory.dmp

              Filesize

              68KB

            • memory/2144-71-0x000000000ADB0000-0x000000000ADC1000-memory.dmp

              Filesize

              68KB

            • memory/2228-74-0x0000000004FF0000-0x0000000005001000-memory.dmp

              Filesize

              68KB

            • memory/2228-73-0x0000000004BE0000-0x0000000004BF1000-memory.dmp

              Filesize

              68KB

            • memory/2820-102-0x00000000026C0000-0x0000000002A8B000-memory.dmp

              Filesize

              3.8MB

            • memory/2820-103-0x0000000002A90000-0x0000000002AA1000-memory.dmp

              Filesize

              68KB

            • memory/2844-657-0x0000000000080000-0x0000000000140000-memory.dmp

              Filesize

              768KB

            • memory/2844-654-0x0000000000080000-0x0000000000140000-memory.dmp

              Filesize

              768KB

            • memory/2880-424-0x0000000002970000-0x0000000002974000-memory.dmp

              Filesize

              16KB

            • memory/3016-115-0x0000000000820000-0x00000000008E0000-memory.dmp

              Filesize

              768KB

            • memory/3016-118-0x0000000000820000-0x00000000008E0000-memory.dmp

              Filesize

              768KB