Analysis
-
max time kernel
114s -
max time network
135s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
14-07-2021 15:12
Static task
static1
Behavioral task
behavioral1
Sample
856bf12bf3ecb5b5a388a0a58f99be9b.exe
Resource
win7v20210408
General
-
Target
856bf12bf3ecb5b5a388a0a58f99be9b.exe
-
Size
656KB
-
MD5
856bf12bf3ecb5b5a388a0a58f99be9b
-
SHA1
6b632e17a4ab106806d378f598f0904906eec1e4
-
SHA256
949b755ce7ba4afeffe8c261141b77bca5f443761aa062936141ed94b737e848
-
SHA512
98903e3763d43c2983b132029a215a9dc0c83ea4a4e9af8e2530b1f6c655162be12b7e18a79c62f1965c75d5855a761962d114ef4d41d87da06d341b5a5302da
Malware Config
Extracted
cryptbot
wymbhy32.top
moriue03.top
-
payload_url
http://hofxuo04.top/download.php?file=lv.exe
Signatures
-
CryptBot Payload 3 IoCs
resource yara_rule behavioral2/memory/2116-115-0x0000000000400000-0x0000000000A10000-memory.dmp family_cryptbot behavioral2/memory/2116-114-0x0000000002620000-0x00000000026F1000-memory.dmp family_cryptbot behavioral2/memory/752-138-0x0000000002C00000-0x0000000002D4A000-memory.dmp family_cryptbot -
Blocklisted process makes network request 4 IoCs
flow pid Process 38 3140 WScript.exe 40 3140 WScript.exe 42 3140 WScript.exe 44 3140 WScript.exe -
Downloads MZ/PE file
-
Executes dropped EXE 7 IoCs
pid Process 3984 xAPxbCeXaaMVED.exe 3288 vpn.exe 752 4.exe 3932 Ricordarti.exe.com 2768 Ricordarti.exe.com 2044 SmartClock.exe 520 vijxoht.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk 4.exe -
Loads dropped DLL 2 IoCs
pid Process 3984 xAPxbCeXaaMVED.exe 2116 rundll32.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 22 ip-api.com -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\foler\olader\acppage.dll xAPxbCeXaaMVED.exe File created C:\Program Files (x86)\foler\olader\adprovider.dll xAPxbCeXaaMVED.exe File created C:\Program Files (x86)\foler\olader\acledit.dll xAPxbCeXaaMVED.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 856bf12bf3ecb5b5a388a0a58f99be9b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 856bf12bf3ecb5b5a388a0a58f99be9b.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Ricordarti.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Ricordarti.exe.com -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings Ricordarti.exe.com -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 WScript.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 904 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2044 SmartClock.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2116 wrote to memory of 3984 2116 856bf12bf3ecb5b5a388a0a58f99be9b.exe 79 PID 2116 wrote to memory of 3984 2116 856bf12bf3ecb5b5a388a0a58f99be9b.exe 79 PID 2116 wrote to memory of 3984 2116 856bf12bf3ecb5b5a388a0a58f99be9b.exe 79 PID 3984 wrote to memory of 3288 3984 xAPxbCeXaaMVED.exe 80 PID 3984 wrote to memory of 3288 3984 xAPxbCeXaaMVED.exe 80 PID 3984 wrote to memory of 3288 3984 xAPxbCeXaaMVED.exe 80 PID 3984 wrote to memory of 752 3984 xAPxbCeXaaMVED.exe 81 PID 3984 wrote to memory of 752 3984 xAPxbCeXaaMVED.exe 81 PID 3984 wrote to memory of 752 3984 xAPxbCeXaaMVED.exe 81 PID 3288 wrote to memory of 3976 3288 vpn.exe 82 PID 3288 wrote to memory of 3976 3288 vpn.exe 82 PID 3288 wrote to memory of 3976 3288 vpn.exe 82 PID 3976 wrote to memory of 2348 3976 cmd.exe 84 PID 3976 wrote to memory of 2348 3976 cmd.exe 84 PID 3976 wrote to memory of 2348 3976 cmd.exe 84 PID 2348 wrote to memory of 1552 2348 cmd.exe 85 PID 2348 wrote to memory of 1552 2348 cmd.exe 85 PID 2348 wrote to memory of 1552 2348 cmd.exe 85 PID 2348 wrote to memory of 3932 2348 cmd.exe 86 PID 2348 wrote to memory of 3932 2348 cmd.exe 86 PID 2348 wrote to memory of 3932 2348 cmd.exe 86 PID 2348 wrote to memory of 904 2348 cmd.exe 87 PID 2348 wrote to memory of 904 2348 cmd.exe 87 PID 2348 wrote to memory of 904 2348 cmd.exe 87 PID 3932 wrote to memory of 2768 3932 Ricordarti.exe.com 88 PID 3932 wrote to memory of 2768 3932 Ricordarti.exe.com 88 PID 3932 wrote to memory of 2768 3932 Ricordarti.exe.com 88 PID 752 wrote to memory of 2044 752 4.exe 89 PID 752 wrote to memory of 2044 752 4.exe 89 PID 752 wrote to memory of 2044 752 4.exe 89 PID 2768 wrote to memory of 520 2768 Ricordarti.exe.com 92 PID 2768 wrote to memory of 520 2768 Ricordarti.exe.com 92 PID 2768 wrote to memory of 520 2768 Ricordarti.exe.com 92 PID 2768 wrote to memory of 940 2768 Ricordarti.exe.com 93 PID 2768 wrote to memory of 940 2768 Ricordarti.exe.com 93 PID 2768 wrote to memory of 940 2768 Ricordarti.exe.com 93 PID 2768 wrote to memory of 3140 2768 Ricordarti.exe.com 94 PID 2768 wrote to memory of 3140 2768 Ricordarti.exe.com 94 PID 2768 wrote to memory of 3140 2768 Ricordarti.exe.com 94 PID 520 wrote to memory of 2116 520 vijxoht.exe 95 PID 520 wrote to memory of 2116 520 vijxoht.exe 95 PID 520 wrote to memory of 2116 520 vijxoht.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\856bf12bf3ecb5b5a388a0a58f99be9b.exe"C:\Users\Admin\AppData\Local\Temp\856bf12bf3ecb5b5a388a0a58f99be9b.exe"1⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\xAPxbCeXaaMVED.exe"C:\Users\Admin\AppData\Local\Temp\xAPxbCeXaaMVED.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Bisognava.swf4⤵
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Windows\SysWOW64\cmd.execmd5⤵
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^qcxKbvvNNXdEjdFxkvFHLYLwwjIiKrlvnbexCySrdBbgBkibkuQJjYRwJzIlNfeKNUyPhkSyDBdpAbmQtkVDhApmFqLobIfwmNBGyapZgKyKIIAkTRyCzm$" Guardi.swf6⤵PID:1552
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Ricordarti.exe.comRicordarti.exe.com V6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Ricordarti.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Ricordarti.exe.com V7⤵
- Executes dropped EXE
- Checks processor information in registry
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\vijxoht.exe"C:\Users\Admin\AppData\Local\Temp\vijxoht.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\VIJXOH~1.DLL,s C:\Users\Admin\AppData\Local\Temp\vijxoht.exe9⤵
- Loads dropped DLL
PID:2116
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\syspnhm.vbs"8⤵PID:940
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\tdrteywjfi.vbs"8⤵
- Blocklisted process makes network request
- Modifies system certificate store
PID:3140
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 306⤵
- Runs ping.exe
PID:904
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"3⤵
- Executes dropped EXE
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
PID:2044
-
-
-