Analysis

  • max time kernel
    125s
  • max time network
    125s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    27-03-2021 19:32

General

  • Target

    SecuriteInfo.com.Trojan.PWS.Siggen2.63733.4520.11539.exe

  • Size

    644KB

  • MD5

    b68f0ee033a8cd19ce47f6ae4f0eaee4

  • SHA1

    129e9dd019f62810a669b29bf44e3eca485c9c5a

  • SHA256

    2ce81e2dd2330f10eb414e56222cd1ba4c26591381f07e199b08f623b8c4b8f9

  • SHA512

    bf152424f47b407ce990ade08d784d33bae18c0747622eb4df97455d901b54b7e5053cb0823e31f8b79905f2da86ac29440a035493299b19d54ed1b6de9e1fdb

Malware Config

Extracted

Family

cryptbot

C2

bafoe62.top

morurt06.top

Attributes
  • payload_url

    http://akpgi08.top/download.php?file=lv.exe

Signatures

  • CryptBot

    A C++ stealer distributed widely in bundle with other software.

  • CryptBot Payload 2 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PWS.Siggen2.63733.4520.11539.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PWS.Siggen2.63733.4520.11539.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1212
    • C:\Users\Admin\AppData\Local\Temp\Lunyt.exe
      "C:\Users\Admin\AppData\Local\Temp\Lunyt.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3520
      • C:\Windows\SysWOW64\at.exe
        "C:\Windows\System32\at.exe"
        3⤵
          PID:4048
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c C:\Windows\system32\cmd.exe < Sia.mid
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3900
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2756
            • C:\Windows\SysWOW64\findstr.exe
              findstr /V /R "^sqZPiXvLzDYkNszeALrJmTZIWbPkHfMPSMhcBWstuiZlwoihFdkUquJbqdSKilttRpzqtYBExYCsTPHOfBGdrRPLrPx$" Mese.mid
              5⤵
                PID:2764
              • C:\Users\Admin\AppData\Roaming\DLRHDHLXFrBlrn\Sul.exe.com
                Sul.exe.com S
                5⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:3108
                • C:\Users\Admin\AppData\Roaming\DLRHDHLXFrBlrn\Sul.exe.com
                  C:\Users\Admin\AppData\Roaming\DLRHDHLXFrBlrn\Sul.exe.com S
                  6⤵
                  • Executes dropped EXE
                  • Checks processor information in registry
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:936
                  • C:\Users\Admin\AppData\Local\Temp\txactnwmqrq.exe
                    "C:\Users\Admin\AppData\Local\Temp\txactnwmqrq.exe"
                    7⤵
                    • Executes dropped EXE
                    PID:2232
                  • C:\Windows\SysWOW64\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\oqjwusjilv.vbs"
                    7⤵
                      PID:1880
                    • C:\Windows\SysWOW64\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\efntreug.vbs"
                      7⤵
                      • Blocklisted process makes network request
                      • Modifies system certificate store
                      PID:416
                • C:\Windows\SysWOW64\PING.EXE
                  ping 127.0.0.1 -n 30
                  5⤵
                  • Runs ping.exe
                  PID:2180
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\jZbyEcYYc & timeout 3 & del /f /q "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PWS.Siggen2.63733.4520.11539.exe"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1364
            • C:\Windows\SysWOW64\timeout.exe
              timeout 3
              3⤵
              • Delays execution with timeout.exe
              PID:2060

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Lunyt.exe

          MD5

          a2bb6fcbbbe65cd7945fa2577540bed4

          SHA1

          212901effdf062dc1ba6c4bf8165e58da3725810

          SHA256

          0790c012d55f486f92064bd63be8866aa26d181067f9c2ad2192a7bb41061eb9

          SHA512

          b0c66450c4ffd87da96e7501dbb77e1af5d778c4c7b7b76d84f12311dd915bf2cf2ac00f2e91c2043d325474f161382b32e304fe22449270054f512345a90587

        • C:\Users\Admin\AppData\Local\Temp\Lunyt.exe

          MD5

          a2bb6fcbbbe65cd7945fa2577540bed4

          SHA1

          212901effdf062dc1ba6c4bf8165e58da3725810

          SHA256

          0790c012d55f486f92064bd63be8866aa26d181067f9c2ad2192a7bb41061eb9

          SHA512

          b0c66450c4ffd87da96e7501dbb77e1af5d778c4c7b7b76d84f12311dd915bf2cf2ac00f2e91c2043d325474f161382b32e304fe22449270054f512345a90587

        • C:\Users\Admin\AppData\Local\Temp\efntreug.vbs

          MD5

          fb2651dfc218558c1d059be35eb11bc6

          SHA1

          a4ed42b4604ecdff2dee1d05490e9eb15f948e1e

          SHA256

          daf9e4aba835994b4a294dbca747b59b3f113088b836b68bedefed8545217f17

          SHA512

          c495aa473b7aec56c6d3a59a54db8d4057e13731e523cbc59aeb06ad0f67dcf9fb44a36580227dc10326b0e0538b5e27aa8dca4c3daf0a53fed5f002290cfed8

        • C:\Users\Admin\AppData\Local\Temp\jZbyEcYYc\EEYNBV~1.ZIP

          MD5

          01dda2e06808c8ace9dc697b65043266

          SHA1

          44fdc636fcdf5cc585561daded1801b6a952a0e7

          SHA256

          7afb3c26f9453b9b15a5987392e33345cbae0cba4ecc7d1d2cb314e0f5536230

          SHA512

          3f4b6a65132c0cf5c7c5f5c19f334d2eef7d9a3b2c1d24faef8041c9595f881fb0aa2333c3453a62dbccf7de8ecb268624882a9b2c2a1f72b3a405dd7d57f401

        • C:\Users\Admin\AppData\Local\Temp\jZbyEcYYc\NICNYC~1.ZIP

          MD5

          90119dede2a0af5899ca506d9f0cfecd

          SHA1

          acb469584d6d9e48861fca6dd8677dded07e509f

          SHA256

          9a140e46319fd5f16f36f9dd16b778919d747491e99fee36ddd948085d35f8a7

          SHA512

          7632b74ce425adc520ffb8e98b97910f9cc11081c4166a3d0b86b954f9fccb6c3850c2f5fc4f4a50e316b8262f2d66f7630f56ecf65e6d2e2757e3220188e556

        • C:\Users\Admin\AppData\Local\Temp\jZbyEcYYc\_Files\_INFOR~1.TXT

          MD5

          6aef8367929028fa6354b39f5d182c94

          SHA1

          c0cd68480db06c76e6c9f6bbcc3a24270e2eca38

          SHA256

          e07b51b42493c027761ddb1b9a62febe6ff2866a84889736b4e110c1c86c4a96

          SHA512

          52dbd02ed52fdc12aab539f0bcc5925e1334451676b7d738b8c250c02055db7b0c6b1412a4dee6c025be3a96570db8794698c341918a374929fc60a2a84fd8d9

        • C:\Users\Admin\AppData\Local\Temp\jZbyEcYYc\_Files\_SCREE~1.JPE

          MD5

          e76c1f6aab20f7757e295fada78790f9

          SHA1

          cb02f746d33a63b8c2ca10638ca3438bbfc51714

          SHA256

          aea00740709419771acf3a08c0ce29d1208c0c5cf3ac2fafc3ef43691cb00582

          SHA512

          e46aad4480236538f9f9bf8498ac043ad4f0f85798ae5313f043cbdd52ad57d79b82e2cc443e0e4963ead34eb25dab86df8e50190426e03155493514307d213f

        • C:\Users\Admin\AppData\Local\Temp\jZbyEcYYc\files_\SCREEN~1.JPG

          MD5

          e76c1f6aab20f7757e295fada78790f9

          SHA1

          cb02f746d33a63b8c2ca10638ca3438bbfc51714

          SHA256

          aea00740709419771acf3a08c0ce29d1208c0c5cf3ac2fafc3ef43691cb00582

          SHA512

          e46aad4480236538f9f9bf8498ac043ad4f0f85798ae5313f043cbdd52ad57d79b82e2cc443e0e4963ead34eb25dab86df8e50190426e03155493514307d213f

        • C:\Users\Admin\AppData\Local\Temp\jZbyEcYYc\files_\SYSTEM~1.TXT

          MD5

          6e541f1621f2e9c8d5f44644e7faec23

          SHA1

          10970ddf1e6b71d836ef21a66bed27995537a26d

          SHA256

          9a2d03f76326ce622353638e93d0ae61aa4906ff034f6ea0645fcc5e55c7f7e2

          SHA512

          5011c9850eb7aed58b629f6eef7d7e1d39a3ba666bd056c36cec901228baf2f15d547a9646dc2dd3bddb71d493a242e95b06d48650fc0e6bab7530ae7ad0397e

        • C:\Users\Admin\AppData\Local\Temp\oqjwusjilv.vbs

          MD5

          22863da5d8152ae2f483beb476a8b67f

          SHA1

          416c5b4049ddc1a80da83b425d817c10d9ccb7ee

          SHA256

          c325139e1e907055b16ad4d2a48e459d523db296d59d6f8ced2f8a7bd642c9e0

          SHA512

          bb3ceb8476e5f6b82d452c033ceeb01236bdbb1d04fb96fe02383252ac01a4c4701bfd7c9c0bbb7a42a1164e4bddcf3f97aa506e6e7a5d2c2f72367f85e471df

        • C:\Users\Admin\AppData\Local\Temp\txactnwmqrq.exe

          MD5

          a438575ccb68fe9e2323e7e054445736

          SHA1

          1ed7732e52d7a078e289cf678ac76d3b49e16c7d

          SHA256

          6da746396d9cdf44c35c89296d8a15dd0e7df76988024312901054a654cee796

          SHA512

          ff5742b9026f0ea843bce7e9ffa8760317972f7f23ef115ea75a7450402962ca4ced9e3d026ed3369e51f16fa910f14448ff13273a9237dc5aa14e96637663ed

        • C:\Users\Admin\AppData\Local\Temp\txactnwmqrq.exe

          MD5

          a438575ccb68fe9e2323e7e054445736

          SHA1

          1ed7732e52d7a078e289cf678ac76d3b49e16c7d

          SHA256

          6da746396d9cdf44c35c89296d8a15dd0e7df76988024312901054a654cee796

          SHA512

          ff5742b9026f0ea843bce7e9ffa8760317972f7f23ef115ea75a7450402962ca4ced9e3d026ed3369e51f16fa910f14448ff13273a9237dc5aa14e96637663ed

        • C:\Users\Admin\AppData\Roaming\DLRHDHLXFrBlrn\Mese.mid

          MD5

          c3d93ab38763494668e5ec084a071011

          SHA1

          ccb374c23045eea5a1e78a792cbc80fbfac16198

          SHA256

          c92f51784a538e74015c744d4c51e4b4b07afec9d9290949abfed9145b9635d9

          SHA512

          ef6fee7f26dfde62eebb06a9761c3812cb067e26453a2d63021867ff84b3a2a5a3c32d72ec301a9cd0f61f44b51837ba7f840a97b361719697397812046f2045

        • C:\Users\Admin\AppData\Roaming\DLRHDHLXFrBlrn\S

          MD5

          eea882cb8acf258c6972a0e288b3ef20

          SHA1

          2a2d53de861c97be801e4807b7ebbe3435c82ace

          SHA256

          9406f147eea55240e64def22c0446703c5afeb135e92a7f469441a2226efa9df

          SHA512

          2acf3588ac290624af6b4b72e06cbcaeb8872ff3a0dab963cfe81b9b34dfd410cdadb456a0a3a50b41f7c539f0664a0d8b9d55ec1cbf57f51e9095e5234b79f3

        • C:\Users\Admin\AppData\Roaming\DLRHDHLXFrBlrn\Sia.mid

          MD5

          5891c47644ccbdac229e688f00c5211f

          SHA1

          65d3a618fe0bb71255e951eb91c941f6fe6647be

          SHA256

          cd3d106fb3a7bca9e78303a176ec2f21b3fdd041c174311969b572a692c1b88b

          SHA512

          3a9cb4c0860c525d5434e5aba4f7bdf7a550b26a1e03e3ab81c4921b274f16e5bed7bfca9ce6ce6a474d3b464705417c3f3ae108bd21154d90d82d542a2ce0a4

        • C:\Users\Admin\AppData\Roaming\DLRHDHLXFrBlrn\Sul.exe.com

          MD5

          78ba0653a340bac5ff152b21a83626cc

          SHA1

          b12da9cb5d024555405040e65ad89d16ae749502

          SHA256

          05d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7

          SHA512

          efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317

        • C:\Users\Admin\AppData\Roaming\DLRHDHLXFrBlrn\Sul.exe.com

          MD5

          78ba0653a340bac5ff152b21a83626cc

          SHA1

          b12da9cb5d024555405040e65ad89d16ae749502

          SHA256

          05d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7

          SHA512

          efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317

        • C:\Users\Admin\AppData\Roaming\DLRHDHLXFrBlrn\Sul.exe.com

          MD5

          78ba0653a340bac5ff152b21a83626cc

          SHA1

          b12da9cb5d024555405040e65ad89d16ae749502

          SHA256

          05d8cf394190f3a707abfb25fb44d7da9d5f533d7d2063b23c00cc11253c8be7

          SHA512

          efb75e4c1e0057ffb47613fd5aae8ce3912b1558a4b74dbf5284c942eac78ecd9aca98f7c1e0e96ec38e8177e58ffdf54f2eb0385e73eef39e8a2ce611237317

        • C:\Users\Admin\AppData\Roaming\DLRHDHLXFrBlrn\Sussulto.mid

          MD5

          4db743e44403eff2bb9c310c0b406d8e

          SHA1

          dec654906cc5677902eafd92af9afe9f3f870286

          SHA256

          0450d23d2a61f9b10f2bb677d667f348c0d1bff07b83a515745685131a73c753

          SHA512

          5ed574d67e053da5d3ada5d2344fe902b1d0e6aeac9c9353859daf4802777706ef6e97051eb03f76c80e4d74b0f145fe6a1f145ea9f3c13ebbb486baf7540833

        • C:\Users\Admin\AppData\Roaming\DLRHDHLXFrBlrn\Vecchia.mid

          MD5

          eea882cb8acf258c6972a0e288b3ef20

          SHA1

          2a2d53de861c97be801e4807b7ebbe3435c82ace

          SHA256

          9406f147eea55240e64def22c0446703c5afeb135e92a7f469441a2226efa9df

          SHA512

          2acf3588ac290624af6b4b72e06cbcaeb8872ff3a0dab963cfe81b9b34dfd410cdadb456a0a3a50b41f7c539f0664a0d8b9d55ec1cbf57f51e9095e5234b79f3

        • memory/416-41-0x0000000000000000-mapping.dmp

        • memory/936-27-0x0000000000000000-mapping.dmp

        • memory/936-30-0x0000000003120000-0x0000000003121000-memory.dmp

          Filesize

          4KB

        • memory/1212-2-0x00000000027E0000-0x00000000027E1000-memory.dmp

          Filesize

          4KB

        • memory/1212-3-0x00000000025F0000-0x00000000026CF000-memory.dmp

          Filesize

          892KB

        • memory/1212-4-0x0000000000400000-0x00000000004E3000-memory.dmp

          Filesize

          908KB

        • memory/1364-7-0x0000000000000000-mapping.dmp

        • memory/1880-35-0x0000000000000000-mapping.dmp

        • memory/2060-15-0x0000000000000000-mapping.dmp

        • memory/2180-26-0x0000000000000000-mapping.dmp

        • memory/2232-32-0x0000000000000000-mapping.dmp

        • memory/2232-37-0x00000000032A0000-0x00000000032A1000-memory.dmp

          Filesize

          4KB

        • memory/2232-38-0x00000000032A0000-0x0000000003997000-memory.dmp

          Filesize

          7.0MB

        • memory/2232-39-0x0000000000400000-0x0000000000B02000-memory.dmp

          Filesize

          7.0MB

        • memory/2232-40-0x0000000000F50000-0x0000000000F51000-memory.dmp

          Filesize

          4KB

        • memory/2756-19-0x0000000000000000-mapping.dmp

        • memory/2764-20-0x0000000000000000-mapping.dmp

        • memory/3108-23-0x0000000000000000-mapping.dmp

        • memory/3520-5-0x0000000000000000-mapping.dmp

        • memory/3900-17-0x0000000000000000-mapping.dmp

        • memory/4048-16-0x0000000000000000-mapping.dmp