Analysis

  • max time kernel
    578s
  • max time network
    564s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    30-06-2021 07:26

General

  • Target

    b2ead315d6a392726c96cc0f928a5218ecc4282dacd43f36a249219391457093.exe

  • Size

    1.8MB

  • MD5

    7678217358637f0e5f06128dfdc7b3e4

  • SHA1

    0867c058cdcf861deacde7ea2fcd2b589729a3b6

  • SHA256

    b2ead315d6a392726c96cc0f928a5218ecc4282dacd43f36a249219391457093

  • SHA512

    9880f2635237f22ee1da10bd766ebc9df28e73a5ff63191c5c5cd48f6f4ce13be96de0ce03cfdfe0307746258e739102a7aaf1a40d3719099832c5b5fdb770e6

Malware Config

Signatures

  • CryptBot

    A C++ stealer distributed widely in bundle with other software.

  • Blocklisted process makes network request 8 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 9 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 30 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b2ead315d6a392726c96cc0f928a5218ecc4282dacd43f36a249219391457093.exe
    "C:\Users\Admin\AppData\Local\Temp\b2ead315d6a392726c96cc0f928a5218ecc4282dacd43f36a249219391457093.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3172
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c cmd < Ero.avi
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3516
      • C:\Windows\SysWOW64\cmd.exe
        cmd
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4004
        • C:\Windows\SysWOW64\findstr.exe
          findstr /V /R "^nwOhgkZOkTAuHApAkWLoGKlGITnVtOaFGtNDNpuScYUkDxTFlwfAaAQOQoFxMrJvBUmDMFNePTNIPZehqSKrmRhuhZNFEMysfbKJUdSFgjLnMoY$" Bellissima.avi
          4⤵
            PID:3700
          • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Neghi.exe.com
            Neghi.exe.com f
            4⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:196
            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Neghi.exe.com
              C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Neghi.exe.com f
              5⤵
              • Executes dropped EXE
              • Checks processor information in registry
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of WriteProcessMemory
              PID:1492
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\OdrQmN.exe"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:3892
                • C:\Users\Admin\AppData\Local\Temp\OdrQmN.exe
                  "C:\Users\Admin\AppData\Local\Temp\OdrQmN.exe"
                  7⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Drops file in Program Files directory
                  • Suspicious use of WriteProcessMemory
                  PID:2548
                  • C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe
                    "C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"
                    8⤵
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:3568
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\System32\cmd.exe" /c cmd < Ella.mid
                      9⤵
                      • Suspicious use of WriteProcessMemory
                      PID:2484
                      • C:\Windows\SysWOW64\cmd.exe
                        cmd
                        10⤵
                        • Suspicious use of WriteProcessMemory
                        PID:3464
                        • C:\Windows\SysWOW64\findstr.exe
                          findstr /V /R "^ApgPFnDaQzNGcomssNqFbYhsjOZmoYlXyIDQobjHZzDEBDsixaEBxNGBWXCQntlRoQANFIoUAzFrcIPIbStQx$" Accade.mid
                          11⤵
                            PID:680
                          • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\Ritroverai.exe.com
                            Ritroverai.exe.com p
                            11⤵
                            • Executes dropped EXE
                            • Suspicious use of WriteProcessMemory
                            PID:3472
                            • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\Ritroverai.exe.com
                              C:\Users\Admin\AppData\Local\Temp\7ZipSfx.001\Ritroverai.exe.com p
                              12⤵
                              • Executes dropped EXE
                              • Checks processor information in registry
                              • Modifies registry class
                              • Suspicious use of WriteProcessMemory
                              PID:3064
                              • C:\Users\Admin\AppData\Local\Temp\yicfumdxu.exe
                                "C:\Users\Admin\AppData\Local\Temp\yicfumdxu.exe"
                                13⤵
                                • Executes dropped EXE
                                • Suspicious use of WriteProcessMemory
                                PID:2824
                                • C:\Windows\SysWOW64\rundll32.exe
                                  C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\YICFUM~1.TMP,S C:\Users\Admin\AppData\Local\Temp\YICFUM~1.EXE
                                  14⤵
                                  • Blocklisted process makes network request
                                  • Loads dropped DLL
                                  • Drops file in Program Files directory
                                  PID:3280
                                  • C:\Windows\SysWOW64\rundll32.exe
                                    C:\Windows\system32\rundll32.exe C:\PROGRA~3\BKLNGF~1\KGJOCB~1.TMP,UzkadVBpRw== C:\Users\Admin\AppData\Local\Temp\YICFUM~1.TMP
                                    15⤵
                                    • Blocklisted process makes network request
                                    • Loads dropped DLL
                                    • Suspicious use of SetThreadContext
                                    • Checks processor information in registry
                                    • Modifies system certificate store
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of FindShellTrayWindow
                                    PID:1580
                                    • C:\Windows\system32\rundll32.exe
                                      C:\Windows\system32\rundll32.exe C:\Windows\system32\shell32.dll,#61 31801
                                      16⤵
                                        PID:3416
                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp1515.tmp.ps1"
                                        16⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2332
                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Executionpolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\tmp27B5.tmp.ps1"
                                        16⤵
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:1832
                                        • C:\Windows\SysWOW64\nslookup.exe
                                          "C:\Windows\system32\nslookup.exe" -type=any localhost
                                          17⤵
                                            PID:4036
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          schtasks /End /tn \Microsoft\Windows\Wininet\CacheTask
                                          16⤵
                                            PID:4008
                                          • C:\Windows\SysWOW64\schtasks.exe
                                            schtasks /Run /tn \Microsoft\Windows\Wininet\CacheTask
                                            16⤵
                                              PID:1020
                                      • C:\Windows\SysWOW64\WScript.exe
                                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\dxvwqpkqve.vbs"
                                        13⤵
                                          PID:2204
                                        • C:\Windows\SysWOW64\WScript.exe
                                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\jwqyklelhu.vbs"
                                          13⤵
                                          • Blocklisted process makes network request
                                          • Modifies system certificate store
                                          PID:2568
                                    • C:\Windows\SysWOW64\PING.EXE
                                      ping 127.0.0.1 -n 30
                                      11⤵
                                      • Runs ping.exe
                                      PID:3184
                              • C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe
                                "C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"
                                8⤵
                                • Executes dropped EXE
                                • Drops startup file
                                • Suspicious use of WriteProcessMemory
                                PID:208
                                • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
                                  "C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"
                                  9⤵
                                  • Executes dropped EXE
                                  • Suspicious behavior: AddClipboardFormatListener
                                  PID:2660
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\osWauaoIuc & timeout 3 & del /f /q "C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Neghi.exe.com"
                            6⤵
                            • Suspicious use of WriteProcessMemory
                            PID:2268
                            • C:\Windows\SysWOW64\timeout.exe
                              timeout 3
                              7⤵
                              • Delays execution with timeout.exe
                              PID:3724
                      • C:\Windows\SysWOW64\PING.EXE
                        ping 127.0.0.1 -n 30
                        4⤵
                        • Runs ping.exe
                        PID:3160

                Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • memory/208-161-0x0000000000550000-0x0000000000576000-memory.dmp

                  Filesize

                  152KB

                • memory/208-162-0x0000000000400000-0x000000000045B000-memory.dmp

                  Filesize

                  364KB

                • memory/1492-127-0x0000000001CF0000-0x0000000001CF1000-memory.dmp

                  Filesize

                  4KB

                • memory/1580-198-0x0000000003280000-0x0000000003281000-memory.dmp

                  Filesize

                  4KB

                • memory/1832-239-0x0000000007F00000-0x0000000007F01000-memory.dmp

                  Filesize

                  4KB

                • memory/1832-236-0x0000000007950000-0x0000000007951000-memory.dmp

                  Filesize

                  4KB

                • memory/1832-240-0x0000000006940000-0x0000000006941000-memory.dmp

                  Filesize

                  4KB

                • memory/1832-254-0x0000000006943000-0x0000000006944000-memory.dmp

                  Filesize

                  4KB

                • memory/1832-242-0x0000000006942000-0x0000000006943000-memory.dmp

                  Filesize

                  4KB

                • memory/2332-206-0x00000000067E0000-0x00000000067E1000-memory.dmp

                  Filesize

                  4KB

                • memory/2332-216-0x00000000080F0000-0x00000000080F1000-memory.dmp

                  Filesize

                  4KB

                • memory/2332-209-0x0000000007800000-0x0000000007801000-memory.dmp

                  Filesize

                  4KB

                • memory/2332-208-0x0000000007580000-0x0000000007581000-memory.dmp

                  Filesize

                  4KB

                • memory/2332-207-0x00000000067E2000-0x00000000067E3000-memory.dmp

                  Filesize

                  4KB

                • memory/2332-226-0x00000000067E3000-0x00000000067E4000-memory.dmp

                  Filesize

                  4KB

                • memory/2332-223-0x0000000009000000-0x0000000009001000-memory.dmp

                  Filesize

                  4KB

                • memory/2332-222-0x0000000008F30000-0x0000000008F31000-memory.dmp

                  Filesize

                  4KB

                • memory/2332-221-0x00000000097A0000-0x00000000097A1000-memory.dmp

                  Filesize

                  4KB

                • memory/2332-210-0x0000000007720000-0x0000000007721000-memory.dmp

                  Filesize

                  4KB

                • memory/2332-214-0x0000000008040000-0x0000000008041000-memory.dmp

                  Filesize

                  4KB

                • memory/2332-213-0x0000000008150000-0x0000000008151000-memory.dmp

                  Filesize

                  4KB

                • memory/2332-212-0x0000000007BE0000-0x0000000007BE1000-memory.dmp

                  Filesize

                  4KB

                • memory/2332-204-0x0000000006830000-0x0000000006831000-memory.dmp

                  Filesize

                  4KB

                • memory/2332-205-0x0000000006EA0000-0x0000000006EA1000-memory.dmp

                  Filesize

                  4KB

                • memory/2332-211-0x0000000007890000-0x0000000007891000-memory.dmp

                  Filesize

                  4KB

                • memory/2660-167-0x0000000000400000-0x000000000045B000-memory.dmp

                  Filesize

                  364KB

                • memory/2824-181-0x0000000004BA0000-0x0000000004C8B000-memory.dmp

                  Filesize

                  940KB

                • memory/2824-182-0x0000000000400000-0x0000000004495000-memory.dmp

                  Filesize

                  64.6MB

                • memory/2824-180-0x00000000049E0000-0x0000000004AB6000-memory.dmp

                  Filesize

                  856KB

                • memory/3064-168-0x00000000013D0000-0x000000000147E000-memory.dmp

                  Filesize

                  696KB

                • memory/3280-179-0x0000000004240000-0x000000000437F000-memory.dmp

                  Filesize

                  1.2MB

                • memory/3416-199-0x00000000003A0000-0x0000000000540000-memory.dmp

                  Filesize

                  1.6MB

                • memory/3416-200-0x0000018E26890000-0x0000018E26A41000-memory.dmp

                  Filesize

                  1.7MB