Analysis

  • max time kernel
    147s
  • max time network
    147s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    22-01-2021 11:35

General

  • Target

    0x0003000000013132-6.dat.exe

  • Size

    2.8MB

  • MD5

    3667e43d85130fb90d07e4a725fe7b4a

  • SHA1

    711dd470697df3e34ebcbf481ccc9852ac659bbe

  • SHA256

    0beaf24e3a5b13f73b8ef67db0a52815b4948cbceea9a0e5159cfedd7ebb7462

  • SHA512

    2ac9bed721e20b8a352ad41766b1b0eb79413b91d555bf942aaa6b66b47ef04f08a6594bbce649af95c09d7e1352a73db5120b8509a553b006544cdd7fb683db

Malware Config

Signatures

  • CryptBot

    A C++ stealer distributed widely in bundle with other software.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 10 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0x0003000000013132-6.dat.exe
    "C:\Users\Admin\AppData\Local\Temp\0x0003000000013132-6.dat.exe"
    1⤵
    • Checks processor information in registry
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1180
    • C:\Windows\system32\cmd.exe
      "C:\Windows\system32\cmd.exe" /c reg add "HKCU\Software\Cryptbot Software\Cryptbot" /v margin /d C:\ProgramData\Cryptbot\margin.exe /F
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:684
      • C:\Windows\system32\reg.exe
        reg add "HKCU\Software\Cryptbot Software\Cryptbot" /v margin /d C:\ProgramData\Cryptbot\margin.exe /F
        3⤵
          PID:3940
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\uzcpCdRzJpYe & timeout 2 & del /f /q "C:\Users\Admin\AppData\Local\Temp\0x0003000000013132-6.dat.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2144
        • C:\Windows\system32\timeout.exe
          timeout 2
          3⤵
          • Delays execution with timeout.exe
          PID:388

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Install Root Certificate

    1
    T1130

    Modify Registry

    1
    T1112

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Collection

    Data from Local System

    2
    T1005

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\uzcpCdRzJpYe\2AT3B7~1.ZIP
      MD5

      48f5696e4ae873fe9e5836c6d200d76b

      SHA1

      66ca544f6861569b004b042695916bb8cb451ae6

      SHA256

      5ee14a9e89609525c36f8f45aa78685dc2671dd8a6007461cd9fe6fccaeb6e1f

      SHA512

      fa80536384b4bdb798be3210385ded7b706ec4c2662148e6c310f0ccf15b36d145ef45ea72293c204cae60f0ab788ed3e762833a0c53bb273231e52c9c11c2eb

    • C:\ProgramData\uzcpCdRzJpYe\47283761.txt
      MD5

      6e7d7a4a79c6ff8b5057828c0bcb979e

      SHA1

      1e31de4af335770d8ddad2b3648f419585a19cb2

      SHA256

      25dff148fe12aeb60d643ad674c33e28dcdf1b50eb63d19eea9d448b2e937ea5

      SHA512

      7d5e47d8fb4761a3cbc9c6e6c44323611917502ce7de647d05e7854412e15ea90ecc54fd7f5075978af4ec14da36e644cb2a1a57464feabf3f904f27ed5690d0

    • C:\ProgramData\uzcpCdRzJpYe\Files\Files\Desktop\CLOSES~1.TXT
      MD5

      a584c6a96d60229ba4ebae426d9043d7

      SHA1

      b7eefa862368945951ec32fe074f01b7627c8ab0

      SHA256

      6fb1e4944140a6a5eeaaf7ab64069d2be395ea8dfdbdf6d184315e8f59d180b3

      SHA512

      a37a028c2e07f3a516b11620b5ac2a173bd673f1f134caae8a165bef8627a955ce923d9c798374d8936432f0e50d0f0a5739d22f8181a0ae43a8739b3bd6e73e

    • C:\ProgramData\uzcpCdRzJpYe\Files\Files\Desktop\LIMITA~1.TXT
      MD5

      13a8839ca04576f0e7e7feba7adeaa42

      SHA1

      c27f0256321ef2e0cdc16cfc1e40b8c44b5942d8

      SHA256

      9bd01670324896f7e7ac61b2e5671291b451b4ad04fa9eb5cf6cc8d551f4e2c7

      SHA512

      9dba6f2cce64c7a692146b2d77ca940f41c23e3afd86aa97034392ffce51485e77ce376381d0de7f258ebb0a655648a947f34e4a8434f9bd6c7d1d18d6d966b1

    • C:\ProgramData\uzcpCdRzJpYe\Files\Files\Desktop\RENAME~1.TXT
      MD5

      8ad3e310eb49059e13598e2b8833adb5

      SHA1

      f10bf8da21342383b443eb1133c36a4d6679f6d0

      SHA256

      1ca473b2ed75b143e181f526fe396d1c9569a1031c6556a97997f9d9ce5c484a

      SHA512

      423fedcb740019fb7bc2bdacb1ee51541d03da6166841f1d3d20ab4eae0d17260fa021d781a19b8ac4a5bec7a6a78168559921350d31173cc7c83f1aca7abce6

    • C:\ProgramData\uzcpCdRzJpYe\Files\_Info.txt
      MD5

      6b80563ba60f2e480cfd7caef7f56d38

      SHA1

      a490d22edee2985d538862f7af0dbe0afe143a3e

      SHA256

      64d6788faebd51199fa63fb1e9cfe02166d346723d2853eabd295f0c6f549a0a

      SHA512

      abd5f2c97d80e21e20212e6f6dd2d0b345e5e1885582c0fbdfb5e56843a9619dd1c8265b926a889480f88c696ac5de08a4e42a0f7100e14581151a11100e9950

    • C:\ProgramData\uzcpCdRzJpYe\Files\_Screen.jpg
      MD5

      a2c6c706da14751c96614a717402c4fb

      SHA1

      1961f4b0c9a8cf1e8a8722490aef763b55e01955

      SHA256

      e3e99553d9d17269e982d4b9179cea5345ede879aee597f48112717e85131994

      SHA512

      8763184b71a82266fd86a53240c0c691bee7ed91614fbef8f194e82461f96106c861a27b50bd712439029a9c64d7af565bc320e4bc527f0999a24adba17f28f2

    • C:\ProgramData\uzcpCdRzJpYe\MOZ_CO~1.DB
      MD5

      89d4b62651fa5c864b12f3ea6b1521cb

      SHA1

      570d48367b6b66ade9900a9f22d67d67a8fb2081

      SHA256

      22f1159db346d2cc8f4fa544796cc9d243a5737110a17d8e3755a2448404ce70

      SHA512

      e6d3109c5e2aef98a63f42eebe3b10feedb1a8c81d7823380553f84d2d6585f328c18f02e72c3e5c98ace7ffedfb6214a4ea6c87e85cefceada8e630f8df61ff

    • memory/388-13-0x0000000000000000-mapping.dmp
    • memory/684-2-0x0000000000000000-mapping.dmp
    • memory/2144-3-0x0000000000000000-mapping.dmp
    • memory/3940-7-0x0000000000000000-mapping.dmp