Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    16-01-2021 19:19

General

  • Target

    intervpnmix2_1.exe

  • Size

    9.0MB

  • MD5

    aa1515279a03f6726d34f9f97ad3ecce

  • SHA1

    4a73a63691bbdf15af411ca1bd9c7bfc85110f32

  • SHA256

    dc1338766ff9398ff8d68c77e43143a4028ff389ff0231bd941869add11241b0

  • SHA512

    157e283e27613601c84692f85125d62c6301db16447eccc72a5118e11913689ab4194d140f0dd99ad0d7776618c8ea301c13e304491ba4277142ebcb36ed8153

Malware Config

Signatures

  • CryptBot

    A C++ stealer distributed widely in bundle with other software.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
  • Executes dropped EXE 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Program Files directory 44 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\intervpnmix2_1.exe
    "C:\Users\Admin\AppData\Local\Temp\intervpnmix2_1.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1036
    • C:\Program Files (x86)\InterVpn\InterVpn\InterVpn\bin\InterVpn\vruns.exe
      "C:\Program Files (x86)\InterVpn\InterVpn\InterVpn\bin\InterVpn\vruns.exe"
      2⤵
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2036
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\INUoNVHx & timeout 1 & del /f /q "C:\Program Files (x86)\InterVpn\InterVpn\InterVpn\bin\InterVpn\vruns.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1372
        • C:\Windows\SysWOW64\timeout.exe
          timeout 1
          4⤵
          • Delays execution with timeout.exe
          PID:2112
    • C:\Program Files (x86)\InterVpn\InterVpn\InterVpn\bin\InterVpn\intervpnmix2.exe
      "C:\Program Files (x86)\InterVpn\InterVpn\InterVpn\bin\InterVpn\intervpnmix2.exe"
      2⤵
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:1228

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\InterVpn\InterVpn\InterVpn\bin\InterVpn\intervpnmix2.exe
    MD5

    f26dc42b3ce20aaaff3bc059ad1ee51d

    SHA1

    1bdd627c3804ec84c70c514590da0b1f09513a46

    SHA256

    493c3a5440c0025f8f1154bcc002f109872f2dab955a43169583594dcab485e3

    SHA512

    2e6c7832db631be5717e246f1d5f6677c0344109fa35f7a88f8955f0fa437184fa09961ac94b8e55b45a3b9da30f3aa6251c0be94e6a391d69cb0a5c81ba8601

  • C:\Program Files (x86)\InterVpn\InterVpn\InterVpn\bin\InterVpn\intervpnmix2.exe
    MD5

    f26dc42b3ce20aaaff3bc059ad1ee51d

    SHA1

    1bdd627c3804ec84c70c514590da0b1f09513a46

    SHA256

    493c3a5440c0025f8f1154bcc002f109872f2dab955a43169583594dcab485e3

    SHA512

    2e6c7832db631be5717e246f1d5f6677c0344109fa35f7a88f8955f0fa437184fa09961ac94b8e55b45a3b9da30f3aa6251c0be94e6a391d69cb0a5c81ba8601

  • C:\Program Files (x86)\InterVpn\InterVpn\InterVpn\bin\InterVpn\vruns.exe
    MD5

    08b6bafe40b9d0a5a3663567dfaf67fe

    SHA1

    b1496d662a9178fa6cdba42d3639ccb148b3d015

    SHA256

    e310096e361a558c51ff56f42c2639aba9027c02030888604e0f1c51afb06573

    SHA512

    27e38e1ef087bc543c51bf3fad3f4e3ada0297ecedac988d60e677fd813669cc64b1c950e9cbdce4e69a3158554f9e5d63c5e16755c042b7d2fe283bd0f00b59

  • C:\Program Files (x86)\InterVpn\InterVpn\InterVpn\bin\InterVpn\vruns.exe
    MD5

    08b6bafe40b9d0a5a3663567dfaf67fe

    SHA1

    b1496d662a9178fa6cdba42d3639ccb148b3d015

    SHA256

    e310096e361a558c51ff56f42c2639aba9027c02030888604e0f1c51afb06573

    SHA512

    27e38e1ef087bc543c51bf3fad3f4e3ada0297ecedac988d60e677fd813669cc64b1c950e9cbdce4e69a3158554f9e5d63c5e16755c042b7d2fe283bd0f00b59

  • C:\ProgramData\INUoNVHx\172773~1.TXT
    MD5

    550cc6486c1ac1d65c8f1b14517a8294

    SHA1

    6f7b60b1f5b90ac815ab56c78cd7a5de05311fe1

    SHA256

    176bf49d4a7f854a30e1fb19acc33650ad5531a95bba23a9b7108b0129d15e9b

    SHA512

    eb29aefebe6d2ce5d06082c9ea8750de5cf5141e51ecc39457362bd4e8c1ec0313801f805b8b7ef6eaaf24d3e6b5d3ed2912216728ed5308165c00b17dc6f726

  • C:\ProgramData\INUoNVHx\Files\Browsers\Cookies\MOZILL~1.TXT
    MD5

    ecaa88f7fa0bf610a5a26cf545dcd3aa

    SHA1

    57218c316b6921e2cd61027a2387edc31a2d9471

    SHA256

    f1945cd6c19e56b3c1c78943ef5ec18116907a4ca1efc40a57d48ab1db7adfc5

    SHA512

    37c783b80b1d458b89e712c2dfe2777050eff0aefc9f6d8beedee77807d9aeb2e27d14815cf4f0229b1d36c186bb5f2b5ef55e632b108cc41e9fb964c39b42a5

  • C:\ProgramData\INUoNVHx\Files\Browsers\_FILEC~1.TXT
    MD5

    ecaa88f7fa0bf610a5a26cf545dcd3aa

    SHA1

    57218c316b6921e2cd61027a2387edc31a2d9471

    SHA256

    f1945cd6c19e56b3c1c78943ef5ec18116907a4ca1efc40a57d48ab1db7adfc5

    SHA512

    37c783b80b1d458b89e712c2dfe2777050eff0aefc9f6d8beedee77807d9aeb2e27d14815cf4f0229b1d36c186bb5f2b5ef55e632b108cc41e9fb964c39b42a5

  • C:\ProgramData\INUoNVHx\Files\Browsers\_FILEF~1.TXT
    MD5

    ecaa88f7fa0bf610a5a26cf545dcd3aa

    SHA1

    57218c316b6921e2cd61027a2387edc31a2d9471

    SHA256

    f1945cd6c19e56b3c1c78943ef5ec18116907a4ca1efc40a57d48ab1db7adfc5

    SHA512

    37c783b80b1d458b89e712c2dfe2777050eff0aefc9f6d8beedee77807d9aeb2e27d14815cf4f0229b1d36c186bb5f2b5ef55e632b108cc41e9fb964c39b42a5

  • C:\ProgramData\INUoNVHx\Files\Browsers\_FILEP~1.TXT
    MD5

    ecaa88f7fa0bf610a5a26cf545dcd3aa

    SHA1

    57218c316b6921e2cd61027a2387edc31a2d9471

    SHA256

    f1945cd6c19e56b3c1c78943ef5ec18116907a4ca1efc40a57d48ab1db7adfc5

    SHA512

    37c783b80b1d458b89e712c2dfe2777050eff0aefc9f6d8beedee77807d9aeb2e27d14815cf4f0229b1d36c186bb5f2b5ef55e632b108cc41e9fb964c39b42a5

  • C:\ProgramData\INUoNVHx\Files\_FILEP~1.TXT
    MD5

    ecaa88f7fa0bf610a5a26cf545dcd3aa

    SHA1

    57218c316b6921e2cd61027a2387edc31a2d9471

    SHA256

    f1945cd6c19e56b3c1c78943ef5ec18116907a4ca1efc40a57d48ab1db7adfc5

    SHA512

    37c783b80b1d458b89e712c2dfe2777050eff0aefc9f6d8beedee77807d9aeb2e27d14815cf4f0229b1d36c186bb5f2b5ef55e632b108cc41e9fb964c39b42a5

  • C:\ProgramData\INUoNVHx\Files\_Info.txt
    MD5

    e3681c5ee5c422919c59efa2e53e4006

    SHA1

    1f050d0963b1b6f7b7a39977768ebe506a7c69bb

    SHA256

    cb88f681994a90492b260fbeb1569f67032922a73b566818611358fbfb8aca52

    SHA512

    914d20ae1acd9f49167358463211400845ae5a0b1f28c0ad8018649f134a9d176ee1c306d46e36fd09bed4be6719a8228c94d3a84208f550875074841ec3d4e3

  • C:\ProgramData\INUoNVHx\Files\_Screen.jpg
    MD5

    13dd30d38720a80b7acc752b5c48a5b1

    SHA1

    9bb9dcba7cf8a897308a43a4c44331f1d3df9114

    SHA256

    acdd5986098ac64ee259aae86d0399ab8dbc53b56fa93c8989a088d82035022b

    SHA512

    0155b252737a4c445b5a60f3c01898ecfaf5864ef4805e8eb77414f7990ffccc0cece9a0bb323e835d6b4e792552cb4863d012eb5106da46ff149187d7b65a60

  • C:\ProgramData\INUoNVHx\YQNGDC~1.ZIP
    MD5

    ea821a80062daaecf75b51e72d365c58

    SHA1

    1f8a3ee74b4feaf99b3fcf9b1d93d99d24a1e93c

    SHA256

    1228d2c5b9e144ec2bf5d3977b94591f2afb1a979d3d288675366460c5da1ffc

    SHA512

    be4ffd927ce64aca33a9e9d779f4ac1da3c73109f727590ac8147e0d076fa755761a9c460a2bf528d0fa6a5e28165cd37e319ef61eb766eba4cb2f06c8d15b0f

  • C:\ProgramData\INUoNVHx\mocc.db
    MD5

    89d4b62651fa5c864b12f3ea6b1521cb

    SHA1

    570d48367b6b66ade9900a9f22d67d67a8fb2081

    SHA256

    22f1159db346d2cc8f4fa544796cc9d243a5737110a17d8e3755a2448404ce70

    SHA512

    e6d3109c5e2aef98a63f42eebe3b10feedb1a8c81d7823380553f84d2d6585f328c18f02e72c3e5c98ace7ffedfb6214a4ea6c87e85cefceada8e630f8df61ff

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    67a631ff50d2208193abe32f52c71492

    SHA1

    687af1a9233f544b1813256e1f901f5412f274a8

    SHA256

    64c6475bb4e983b6938115ffc65197a6c1ab42c56b62c9e5b8788d9b14ecca29

    SHA512

    f1c234c5d07068a55e3ebd08a2421b3472c08be0582ae9e101692f9a49237e4fa562aeffce063252a927f56876df653f8ecf47bbf76e66d09f9323d456e69306

  • \Program Files (x86)\InterVpn\InterVpn\InterVpn\bin\InterVpn\intervpnmix2.exe
    MD5

    f26dc42b3ce20aaaff3bc059ad1ee51d

    SHA1

    1bdd627c3804ec84c70c514590da0b1f09513a46

    SHA256

    493c3a5440c0025f8f1154bcc002f109872f2dab955a43169583594dcab485e3

    SHA512

    2e6c7832db631be5717e246f1d5f6677c0344109fa35f7a88f8955f0fa437184fa09961ac94b8e55b45a3b9da30f3aa6251c0be94e6a391d69cb0a5c81ba8601

  • \Program Files (x86)\InterVpn\InterVpn\InterVpn\bin\InterVpn\intervpnmix2.exe
    MD5

    f26dc42b3ce20aaaff3bc059ad1ee51d

    SHA1

    1bdd627c3804ec84c70c514590da0b1f09513a46

    SHA256

    493c3a5440c0025f8f1154bcc002f109872f2dab955a43169583594dcab485e3

    SHA512

    2e6c7832db631be5717e246f1d5f6677c0344109fa35f7a88f8955f0fa437184fa09961ac94b8e55b45a3b9da30f3aa6251c0be94e6a391d69cb0a5c81ba8601

  • \Program Files (x86)\InterVpn\InterVpn\InterVpn\bin\InterVpn\intervpnmix2.exe
    MD5

    f26dc42b3ce20aaaff3bc059ad1ee51d

    SHA1

    1bdd627c3804ec84c70c514590da0b1f09513a46

    SHA256

    493c3a5440c0025f8f1154bcc002f109872f2dab955a43169583594dcab485e3

    SHA512

    2e6c7832db631be5717e246f1d5f6677c0344109fa35f7a88f8955f0fa437184fa09961ac94b8e55b45a3b9da30f3aa6251c0be94e6a391d69cb0a5c81ba8601

  • \Program Files (x86)\InterVpn\InterVpn\InterVpn\bin\InterVpn\vruns.exe
    MD5

    08b6bafe40b9d0a5a3663567dfaf67fe

    SHA1

    b1496d662a9178fa6cdba42d3639ccb148b3d015

    SHA256

    e310096e361a558c51ff56f42c2639aba9027c02030888604e0f1c51afb06573

    SHA512

    27e38e1ef087bc543c51bf3fad3f4e3ada0297ecedac988d60e677fd813669cc64b1c950e9cbdce4e69a3158554f9e5d63c5e16755c042b7d2fe283bd0f00b59

  • \Program Files (x86)\InterVpn\InterVpn\InterVpn\bin\InterVpn\vruns.exe
    MD5

    08b6bafe40b9d0a5a3663567dfaf67fe

    SHA1

    b1496d662a9178fa6cdba42d3639ccb148b3d015

    SHA256

    e310096e361a558c51ff56f42c2639aba9027c02030888604e0f1c51afb06573

    SHA512

    27e38e1ef087bc543c51bf3fad3f4e3ada0297ecedac988d60e677fd813669cc64b1c950e9cbdce4e69a3158554f9e5d63c5e16755c042b7d2fe283bd0f00b59

  • \Program Files (x86)\InterVpn\InterVpn\InterVpn\bin\InterVpn\vruns.exe
    MD5

    08b6bafe40b9d0a5a3663567dfaf67fe

    SHA1

    b1496d662a9178fa6cdba42d3639ccb148b3d015

    SHA256

    e310096e361a558c51ff56f42c2639aba9027c02030888604e0f1c51afb06573

    SHA512

    27e38e1ef087bc543c51bf3fad3f4e3ada0297ecedac988d60e677fd813669cc64b1c950e9cbdce4e69a3158554f9e5d63c5e16755c042b7d2fe283bd0f00b59

  • \Users\Admin\AppData\Local\Temp\nsi4423.tmp\UAC.dll
    MD5

    adb29e6b186daa765dc750128649b63d

    SHA1

    160cbdc4cb0ac2c142d361df138c537aa7e708c9

    SHA256

    2f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08

    SHA512

    b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada

  • memory/696-19-0x000007FEF7880000-0x000007FEF7AFA000-memory.dmp
    Filesize

    2.5MB

  • memory/1228-18-0x0000000009320000-0x0000000009331000-memory.dmp
    Filesize

    68KB

  • memory/1228-10-0x0000000000000000-mapping.dmp
  • memory/1228-16-0x0000000008F10000-0x0000000008F21000-memory.dmp
    Filesize

    68KB

  • memory/1372-21-0x0000000000000000-mapping.dmp
  • memory/2036-15-0x00000000040C0000-0x00000000040D1000-memory.dmp
    Filesize

    68KB

  • memory/2036-17-0x00000000044D0000-0x00000000044E1000-memory.dmp
    Filesize

    68KB

  • memory/2036-4-0x0000000000000000-mapping.dmp
  • memory/2112-32-0x0000000000000000-mapping.dmp