Analysis
-
max time kernel
121s -
max time network
115s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
12/07/2021, 08:52
Static task
static1
Behavioral task
behavioral1
Sample
e493d514a5154df3ce530a3dee1d8d07.exe
Resource
win7v20210408
General
-
Target
e493d514a5154df3ce530a3dee1d8d07.exe
-
Size
648KB
-
MD5
e493d514a5154df3ce530a3dee1d8d07
-
SHA1
fba1795a04b5d6e932213b85f68239e0bd086c1f
-
SHA256
1913b57379e19d7d05f7a55160343d7d081fe01c668b0652097311a0e9f57940
-
SHA512
117f429620d1f2fb268fa9deb0cdcc441e2781ae676121ba28030435e989127fe90a76fd725b4ac99ea5ae2b0fa8769eb93993340a973b6e94b587f93dbeab83
Malware Config
Extracted
cryptbot
aledna72.top
-
payload_url
http://otivzt10.top/download.php?file=lv.exe
Signatures
-
CryptBot Payload 2 IoCs
resource yara_rule behavioral2/memory/628-114-0x0000000002ED0000-0x0000000002F9C000-memory.dmp family_cryptbot behavioral2/memory/628-115-0x0000000000400000-0x0000000002C65000-memory.dmp family_cryptbot -
Blocklisted process makes network request 4 IoCs
flow pid Process 35 1424 WScript.exe 37 1424 WScript.exe 39 1424 WScript.exe 41 1424 WScript.exe -
Downloads MZ/PE file
-
Executes dropped EXE 7 IoCs
pid Process 3684 rrOmfypkjmhXt.exe 2224 vpn.exe 2196 4.exe 2980 Vigilanza.exe.com 3064 Vigilanza.exe.com 2152 SmartClock.exe 1164 qiiiltcmwx.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk 4.exe -
Loads dropped DLL 2 IoCs
pid Process 3684 rrOmfypkjmhXt.exe 3068 rundll32.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 19 ip-api.com -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\foler\olader\acppage.dll rrOmfypkjmhXt.exe File created C:\Program Files (x86)\foler\olader\adprovider.dll rrOmfypkjmhXt.exe File created C:\Program Files (x86)\foler\olader\acledit.dll rrOmfypkjmhXt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Vigilanza.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Vigilanza.exe.com Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 e493d514a5154df3ce530a3dee1d8d07.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString e493d514a5154df3ce530a3dee1d8d07.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings Vigilanza.exe.com -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 WScript.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1840 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2152 SmartClock.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 628 wrote to memory of 3684 628 e493d514a5154df3ce530a3dee1d8d07.exe 77 PID 628 wrote to memory of 3684 628 e493d514a5154df3ce530a3dee1d8d07.exe 77 PID 628 wrote to memory of 3684 628 e493d514a5154df3ce530a3dee1d8d07.exe 77 PID 3684 wrote to memory of 2224 3684 rrOmfypkjmhXt.exe 78 PID 3684 wrote to memory of 2224 3684 rrOmfypkjmhXt.exe 78 PID 3684 wrote to memory of 2224 3684 rrOmfypkjmhXt.exe 78 PID 3684 wrote to memory of 2196 3684 rrOmfypkjmhXt.exe 79 PID 3684 wrote to memory of 2196 3684 rrOmfypkjmhXt.exe 79 PID 3684 wrote to memory of 2196 3684 rrOmfypkjmhXt.exe 79 PID 2224 wrote to memory of 3704 2224 vpn.exe 80 PID 2224 wrote to memory of 3704 2224 vpn.exe 80 PID 2224 wrote to memory of 3704 2224 vpn.exe 80 PID 3704 wrote to memory of 3812 3704 cmd.exe 82 PID 3704 wrote to memory of 3812 3704 cmd.exe 82 PID 3704 wrote to memory of 3812 3704 cmd.exe 82 PID 3812 wrote to memory of 3908 3812 cmd.exe 83 PID 3812 wrote to memory of 3908 3812 cmd.exe 83 PID 3812 wrote to memory of 3908 3812 cmd.exe 83 PID 3812 wrote to memory of 2980 3812 cmd.exe 84 PID 3812 wrote to memory of 2980 3812 cmd.exe 84 PID 3812 wrote to memory of 2980 3812 cmd.exe 84 PID 3812 wrote to memory of 1840 3812 cmd.exe 85 PID 3812 wrote to memory of 1840 3812 cmd.exe 85 PID 3812 wrote to memory of 1840 3812 cmd.exe 85 PID 2980 wrote to memory of 3064 2980 Vigilanza.exe.com 86 PID 2980 wrote to memory of 3064 2980 Vigilanza.exe.com 86 PID 2980 wrote to memory of 3064 2980 Vigilanza.exe.com 86 PID 2196 wrote to memory of 2152 2196 4.exe 87 PID 2196 wrote to memory of 2152 2196 4.exe 87 PID 2196 wrote to memory of 2152 2196 4.exe 87 PID 3064 wrote to memory of 1164 3064 Vigilanza.exe.com 89 PID 3064 wrote to memory of 1164 3064 Vigilanza.exe.com 89 PID 3064 wrote to memory of 1164 3064 Vigilanza.exe.com 89 PID 3064 wrote to memory of 1160 3064 Vigilanza.exe.com 90 PID 3064 wrote to memory of 1160 3064 Vigilanza.exe.com 90 PID 3064 wrote to memory of 1160 3064 Vigilanza.exe.com 90 PID 3064 wrote to memory of 1424 3064 Vigilanza.exe.com 91 PID 3064 wrote to memory of 1424 3064 Vigilanza.exe.com 91 PID 3064 wrote to memory of 1424 3064 Vigilanza.exe.com 91 PID 1164 wrote to memory of 3068 1164 qiiiltcmwx.exe 92 PID 1164 wrote to memory of 3068 1164 qiiiltcmwx.exe 92 PID 1164 wrote to memory of 3068 1164 qiiiltcmwx.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\e493d514a5154df3ce530a3dee1d8d07.exe"C:\Users\Admin\AppData\Local\Temp\e493d514a5154df3ce530a3dee1d8d07.exe"1⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\rrOmfypkjmhXt.exe"C:\Users\Admin\AppData\Local\Temp\rrOmfypkjmhXt.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Com.eps4⤵
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\SysWOW64\cmd.execmd5⤵
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^YCOdJJZkdYoAFHrXZiWwDNaLZTdcPBoWBxjekRZaqtWdKMBcgLwJqBdkprsPaDcPQjZlxqMoiDwmQewjaVitmnWZtwSiAlZvJimnMdqhYTBvAQxietbbcdfsdquziEIXEEQICCmwUUuFW$" Una.eps6⤵PID:3908
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Vigilanza.exe.comVigilanza.exe.com q6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Vigilanza.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Vigilanza.exe.com q7⤵
- Executes dropped EXE
- Checks processor information in registry
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\qiiiltcmwx.exe"C:\Users\Admin\AppData\Local\Temp\qiiiltcmwx.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\QIIILT~1.DLL,s C:\Users\Admin\AppData\Local\Temp\QIIILT~1.EXE9⤵
- Loads dropped DLL
PID:3068
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\fxhvpkwr.vbs"8⤵PID:1160
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\wsemoswutf.vbs"8⤵
- Blocklisted process makes network request
- Modifies system certificate store
PID:1424
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 306⤵
- Runs ping.exe
PID:1840
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"3⤵
- Executes dropped EXE
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
PID:2152
-
-
-