Resubmissions

05-07-2021 17:47

210705-1p2sjaphes 10

27-05-2021 14:10

210527-ar62acaq4a 10

Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    27-05-2021 14:10

General

  • Target

    24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe

  • Size

    1.9MB

  • MD5

    abd35d575a95891bac53ec57e8d33ccd

  • SHA1

    78078d9d1c867fca632ccac4fec5bfc65230f1ab

  • SHA256

    24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42

  • SHA512

    6036f6ad53f5b525f7ff2f48d1924d63fcac520dcfd57bba8288317e7bdd8c75470a2f050b16483e62143ac5090a7250e56b0030e89d7279d9b1998122429bd3

Malware Config

Signatures

  • CryptBot

    A C++ stealer distributed widely in bundle with other software.

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\24e43fbe7752e30765786d4b49a489ae15d0543b00cb049f13388142cb45cc42.bin.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3176
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c xVpguGGxyc
      2⤵
        PID:1440
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c bpEOnapciaOcVvMCGJUMWoiuIyTpAaGvJv
        2⤵
          PID:1800
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c dcQZdSoMHFAgSxtqK
          2⤵
            PID:2372
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c JjfenyanqUPLaLmzciPKETNcmAiRwPvsWkZpN
            2⤵
              PID:2780
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c WKGRShXWjOOnYXlZFQnTDXYBbknbPuMdGilttNqAnDgaeD
              2⤵
                PID:3516
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c miWGoKTKZMtxGPAuyenRQMyVRPYxqIFmTcYfSADGMbkaZzxLYvodELZMwwOaMmKdiFAkQlhFmSyaBNWncjvDmfUicjhRLlThNUlxSoVOoDQMGGkgydXmeuQSKzPE
                2⤵
                  PID:3720
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c vTgYRFHCBFjsIxWnoAOwZMchxlHraJmzsRMJCOPwDLDKKixLUzBSqCXJnwDGYDlSyTqQIjWxLNbhpKDhQVoYiHaOUekBlorZBKFQuErHbiihyJANbdQeckKnBjVFwcpCKbMnyMukSBBq
                  2⤵
                    PID:772
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\System32\cmd.exe" /c tIkCbrUawEdqifUIbGeYFDIWwILpEpTKKYvEKrDsglISvnXbjDcUneUBZgAOaLNRKFdpSdXzeKJcUQAD
                    2⤵
                      PID:2124
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\System32\cmd.exe" /c hXwOZkHrVEvDPZDvRiQoOFWFwSOamGpNWrtOLeLzIuWLBQhKuYeJJcWIqvMibgDgcIHLVOLPcvmIIlrkErjBDAtAucNffEWzCHdTpBOshhhhW
                      2⤵
                        PID:188
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\System32\cmd.exe" /c qPaBCxeeLVEuFAwcmRAuyqUlergVhdjRERcXXOwCsAWxfeWgd
                        2⤵
                          PID:1384
                        • C:\Windows\SysWOW64\cmd.exe
                          "C:\Windows\System32\cmd.exe" /c OvMPpqUimmyuOxINBNyrbKPYPErmVZuZFvBQtPIxeQgCvlMBMCBppjzrGNqEXcjmayBaTRIMtKqHcjBFSBNznXQaenldOrbHEPlsIxIUTOtmjLHzkxMcHSwcfpfcHsX
                          2⤵
                            PID:1660
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\System32\cmd.exe" /c jarGelWbSSm
                            2⤵
                              PID:2020
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\System32\cmd.exe" /c SdudQQtxswZLNOwmthhCQtjTIqdwbgDPzsCYeZEQjDJlzaTgpbzFEXTOrhIPmrWenlsckevyJvfjceAfueRqVYlvnOVPsOspHGLowneuwh
                              2⤵
                                PID:2536
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\System32\cmd.exe" /c oHGawMaIbjWuAZVXbiGNUyuFOdsgIqKYIeeORcTeYyUXLAkpyAFZxmweBwELctqvBXnnWuywgDPPkpThtioocLEoqqhPRiHUybvOwMjZxDLQKjRaodGhVRqPadbWTdluWUJNNyjaVp
                                2⤵
                                  PID:3440
                                • C:\Windows\SysWOW64\cmd.exe
                                  "C:\Windows\System32\cmd.exe" /c RqObOoUHAAxZhbGcLgfutzETQCrFetgaMtpOESINYIJFCUvduJBrFrIbcUGjyfFckwhogRRSGCivJYsVuMmzDkMJvLzJjvIJrgzAHhegRIbrVkOvDLu
                                  2⤵
                                    PID:3516
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /c QjSqfEMCnoGpTnzcFQgSJlBUOJNlXWuBfgTRvzkrBmPJehpbSaRMvhJFLXkGQ
                                    2⤵
                                      PID:3720
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /c FCwyTFECZkFlspcRRBmdaEtxteFhyniFjZTjHXzESfaGujWmlTyKuAownHqRZsvBrqXsdopUoVbrkbhSuur
                                      2⤵
                                        PID:3968
                                      • C:\Windows\SysWOW64\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /c abnMRSOqWBEBTRCygEpwKkCkeyPqxoLThloGCkAbxpX
                                        2⤵
                                          PID:3900
                                        • C:\Windows\SysWOW64\cmd.exe
                                          "C:\Windows\System32\cmd.exe" /c dWpxViEBWwCuVhJLrNGOPLhJIWDetMHAgVUuVcyjElWjHeKgCOzGDoQEIALYDBblzwRqaCQIIzpFOwwGjfAfawXytdbxJuIeMM
                                          2⤵
                                            PID:812
                                          • C:\Windows\SysWOW64\cmd.exe
                                            "C:\Windows\System32\cmd.exe" /c GlKWZYLYpZlQHmyMgwiSarMVeycYBKiTepxcBzBsGrOuTmQVExzwFUmCnOTTCMvnRsNntJlVAPkffFwCfAxudygoJRXMmHPUGfgCMsQUpnAPJphSNdEwsfiMrFOjLnvTq
                                            2⤵
                                              PID:1164
                                            • C:\Windows\SysWOW64\cmd.exe
                                              "C:\Windows\System32\cmd.exe" /c JZdmQXKmXSFnmmEtZoeNCdoCnuCDpLeHOaAgCgAGsRafuEugIGnhQh
                                              2⤵
                                                PID:1480
                                              • C:\Windows\SysWOW64\cmd.exe
                                                "C:\Windows\System32\cmd.exe" /c aRNqJxidkQXKuZfCLHcvKXScUqgUCjORBEibOhRjlBunpUZfztNFxRrxYsuIujOYwuoBSSObQpkpRxjZqYBbmpvKBMnvioyXMibeMbbAddOlFTDEyuIiL
                                                2⤵
                                                  PID:2344
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  "C:\Windows\System32\cmd.exe" /c mRKnqyzsfItgvJWphCBqipxktIoUdwAXjcHGahbsiYquusvUIVTyGKp
                                                  2⤵
                                                    PID:3584
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    "C:\Windows\System32\cmd.exe" /c bnzaWmqgiuwwwdRZypToohtNkgjcocsBjsoUUyxHXMZqfcSstTZvRqo
                                                    2⤵
                                                      PID:2780
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /c zFuIjFyMPAOKiWyZPklcgtnQcUdfcVJkoZA
                                                      2⤵
                                                        PID:3976
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        "C:\Windows\System32\cmd.exe" /c ZMcaGhkOGoliNZHGPMVgifjsgQdTQDBovRqePSPqTJlhKpBv
                                                        2⤵
                                                          PID:2104
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          "C:\Windows\System32\cmd.exe" /c rcvrjuJArtPXsXrHeLWZEQXXUxnyZHtfUFNiytlLdCMOZrC
                                                          2⤵
                                                            PID:2124
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            "C:\Windows\system32\cmd.exe" /c kETsrwWgoFbppHflMfdhiWcwUqCqE & fOcmzeiuplOoPmFQLQeLIkymZgpRbrmVJjdJNKhjrGyynYiWvrfLXThrJVAyTfIuKTmDoWewCPHwyZwqihxxNNXQYhZSpozNYZcFmENAqgpokjXJUmXGUgaWVJEUWlRzvTruEcBDmUzm & PEMdfYJkNTJHnKQZSEQvQLapRymYxuZUSayySEGjioJqznyKKEGdDeNrjDnlnLRGTOOyEKugXDfIeaPaZOhPmJsPEwT & yvNvdeuEJZuqnaaZNywUNulKbwulbYBCRQoBPTsZkkIZHhsidsem & ZCZkeYfVWu & nDoHpRpTNwICblepJZTyWwCShpfNUwtgtXBtyKYnipLYdqBwqPFWeqObqfzZBvYMXzbAJYtZqcYMfDChIgNycijrorrPdYXKlZqWCwswLGVHe & ivNudhJSdQixsFU & JenhCfDFKHWLxPkFquWGwlHJqsJlPoJMivXTpPmRTocJdYnA & CzkJhjmxOjlGaPBXlDXSackGtMTOYzeTpGhPnrTlnmxCgkBzTLucAIjuiEFAaKcclsbMBMmiJNzSqJaSkAUjjGaAziHU & aRNrZsWOPRijZLNgzynkMfSQooDZWaxtFJdVGOwsctcIMqhVFkZepILrYXVQOXRvbeGfxRIFti & IUlroVIzKaaVXYhXJTlDbjYkJxXAODxYwRroOTMVyEutyuJsuTZLTEacVYzNYiFiXzUyUtoQugbTyUuCLFxUEItbmHhPmZXYYZuLjDbwLpFEunfwSQeaNLDffvGh & adismVuNcdioapxemdqajXIWElhvRcQXplaSnhHDohvAUlxBojQyGUExIlNgHKWZmlYiQCEjIvpZBiwzQLhEFKdfFXlhAzWndvwKjjLGHDblLFTApznVvsxPUJCTas & gmLItusiDqHWwhuDqtJtuVqwYwkPDKRhdRoKqWOxRjUVPczCNyBPIjFzmJKeUBESozGptvDtfgjUqyjDIJeboeFrjPkdjLAfHeMcOpbsBbmxZLaz & uzlmuJyOCXfkjRDOXjYaQOmjLWLDktAvRTysfQBzHHjkiugFVFenxwGsUYNlYCDnvTzzMjnu & FKpCgtFHyHFweePhNbsrdxttNOgMVTJuWNPdbPFToDSVXvxQEuZOirxlGyOmQTLjXnyghnPYRnVNBpudzboPUVZTaEKsqyefRGXmsuDydqWIoG & vYnuzKWaenjVINnXLcGWVjHZhTemTYdKMVgaCZJEVgUqylUsSelhBKNlsmSmHbnriBpMmycMLwwGsGTrYLHQNrpworwrulWnPRSEqoS & HnCAJuTKFPAWQIdtaoEctaFByDRAOfrQTUofBJawldbsJZIuBOjSDvIgTqxufzWdMKrVmqDJPClNVhRyVKYqrljvkUcAgkLRxiFZWMGAlCeqkVzFog & FxWhBbGKFErxDRazNHSpornPAikkfBQsZqubnUtB & wwViompTBFXdyeCVuMzkcxtOLxDKUVTDsTiwDIsIwaNVSwUYECsiK & UGXuvNWmYGMxYjUAancKprHoWKAEuaDMTwYBtvjEMCzipneHrrl & MZyRZOlLhsaFeZBWhzvVkQXHJmZnHSBroKZTWuCfjAsclOtpXyzKHgHVenomOLtxPfbaqHqiRuJLmCvVcQBBnRcUetRbYrAAcWFUdLpftjSBEWcmwjrYlCVYTDdVQDoOFpfD & BEKGjvkYUfuIscLZCdTqHwNxhnBttVcGSDmIzsYyJqZhljnivOrTvCfAQfzNViTYUAQOVrGlsNsGwmlqZxIdSBpdhZRtYllCuqaKvKkaoSBIlIndtaNBmDuadAAWjBjiDOmwiAEfofiZ & ByEAAZFbIeD & C:\Windows\system32\cmd < Naso.avi
                                                            2⤵
                                                              PID:188
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                C:\Windows\system32\cmd
                                                                3⤵
                                                                  PID:1384
                                                                  • C:\Windows\SysWOW64\findstr.exe
                                                                    findstr /V /R "^JMwsfVERnDBURqxHDYhNCuTSPfHILUaLUPRAorBOUkHipfETBjTFiEaDSpBZhWuDkQqeoTmmbmSdnMIALOunwMEdvgIYBBAYytWzgBKINziHMeyuAwgmPHCmjKFUlAYWYUlzQfkprnLIEW$" Pensato.avi
                                                                    4⤵
                                                                      PID:1264
                                                                    • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Tra.exe.com
                                                                      Tra.exe.com C
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      PID:1660
                                                                      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Tra.exe.com
                                                                        C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Tra.exe.com C
                                                                        5⤵
                                                                        • Executes dropped EXE
                                                                        • Checks processor information in registry
                                                                        • Suspicious use of FindShellTrayWindow
                                                                        PID:2344
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          "C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\RaLVUjgQZVvR & timeout 3 & del /f /q "C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Tra.exe.com"
                                                                          6⤵
                                                                            PID:1496
                                                                            • C:\Windows\SysWOW64\timeout.exe
                                                                              timeout 3
                                                                              7⤵
                                                                              • Delays execution with timeout.exe
                                                                              PID:2792
                                                                      • C:\Windows\SysWOW64\PING.EXE
                                                                        ping 127.0.0.1 -n 30
                                                                        4⤵
                                                                        • Runs ping.exe
                                                                        PID:2072

                                                                Network

                                                                MITRE ATT&CK Enterprise v6

                                                                Replay Monitor

                                                                Loading Replay Monitor...

                                                                Downloads

                                                                • memory/2344-154-0x0000000001250000-0x0000000001251000-memory.dmp

                                                                  Filesize

                                                                  4KB