Analysis

  • max time kernel
    114s
  • max time network
    135s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    14-07-2021 15:12

General

  • Target

    856bf12bf3ecb5b5a388a0a58f99be9b.exe

  • Size

    656KB

  • MD5

    856bf12bf3ecb5b5a388a0a58f99be9b

  • SHA1

    6b632e17a4ab106806d378f598f0904906eec1e4

  • SHA256

    949b755ce7ba4afeffe8c261141b77bca5f443761aa062936141ed94b737e848

  • SHA512

    98903e3763d43c2983b132029a215a9dc0c83ea4a4e9af8e2530b1f6c655162be12b7e18a79c62f1965c75d5855a761962d114ef4d41d87da06d341b5a5302da

Malware Config

Extracted

Family

cryptbot

C2

wymbhy32.top

moriue03.top

Attributes
  • payload_url

    http://hofxuo04.top/download.php?file=lv.exe

Signatures

  • CryptBot

    A C++ stealer distributed widely in bundle with other software.

  • CryptBot Payload 3 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 7 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\856bf12bf3ecb5b5a388a0a58f99be9b.exe
    "C:\Users\Admin\AppData\Local\Temp\856bf12bf3ecb5b5a388a0a58f99be9b.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:2116
    • C:\Users\Admin\AppData\Local\Temp\xAPxbCeXaaMVED.exe
      "C:\Users\Admin\AppData\Local\Temp\xAPxbCeXaaMVED.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:3984
      • C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe
        "C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3288
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c cmd < Bisognava.swf
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3976
          • C:\Windows\SysWOW64\cmd.exe
            cmd
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2348
            • C:\Windows\SysWOW64\findstr.exe
              findstr /V /R "^qcxKbvvNNXdEjdFxkvFHLYLwwjIiKrlvnbexCySrdBbgBkibkuQJjYRwJzIlNfeKNUyPhkSyDBdpAbmQtkVDhApmFqLobIfwmNBGyapZgKyKIIAkTRyCzm$" Guardi.swf
              6⤵
                PID:1552
              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Ricordarti.exe.com
                Ricordarti.exe.com V
                6⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:3932
                • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Ricordarti.exe.com
                  C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Ricordarti.exe.com V
                  7⤵
                  • Executes dropped EXE
                  • Checks processor information in registry
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:2768
                  • C:\Users\Admin\AppData\Local\Temp\vijxoht.exe
                    "C:\Users\Admin\AppData\Local\Temp\vijxoht.exe"
                    8⤵
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:520
                    • C:\Windows\SysWOW64\rundll32.exe
                      C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\VIJXOH~1.DLL,s C:\Users\Admin\AppData\Local\Temp\vijxoht.exe
                      9⤵
                      • Loads dropped DLL
                      PID:2116
                  • C:\Windows\SysWOW64\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\syspnhm.vbs"
                    8⤵
                      PID:940
                    • C:\Windows\SysWOW64\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\tdrteywjfi.vbs"
                      8⤵
                      • Blocklisted process makes network request
                      • Modifies system certificate store
                      PID:3140
                • C:\Windows\SysWOW64\PING.EXE
                  ping 127.0.0.1 -n 30
                  6⤵
                  • Runs ping.exe
                  PID:904
          • C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe
            "C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"
            3⤵
            • Executes dropped EXE
            • Drops startup file
            • Suspicious use of WriteProcessMemory
            PID:752
            • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
              "C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: AddClipboardFormatListener
              PID:2044

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Install Root Certificate

      1
      T1130

      Modify Registry

      1
      T1112

      Credential Access

      Credentials in Files

      3
      T1081

      Discovery

      Query Registry

      2
      T1012

      System Information Discovery

      2
      T1082

      Remote System Discovery

      1
      T1018

      Collection

      Data from Local System

      3
      T1005

      Command and Control

      Web Service

      1
      T1102

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Bisognava.swf
        MD5

        f702abe712e41a829fa4013e68a3d8ab

        SHA1

        f63db1822ac4d842eeb5a8fd9d1986edf18c6c38

        SHA256

        420b92adc8a1a4ca57ac74966a8a6a52684ebb12de25403352aeee0a30e99a30

        SHA512

        473a2440fde483b9ebb673037104095ff648eb5e161e6b1853f40923220d5bc1cff7461294cd382093f0dc0ce5006ab7028e9a1e9b6976ba78e77274eccbca1a

      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Guardi.swf
        MD5

        5d9d75952a8e14b2c34f6baa84becc0a

        SHA1

        57dc9c663b05cc3087b7abf0fbb72db928da59a0

        SHA256

        b5b9c7de312d633f2cd9ea270adb0f04cd2d789ebb71b4f8ad88f429273b861a

        SHA512

        4180ff890b2b2a06430a5b1ddd50db288dda43c0b5bb8900207bcba4b24c0d0d0ecad56159e7fe384cbc04397a17c57d7853e99ab86dc47c922ead7bc01a7e4f

      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Prostro.swf
        MD5

        356d0a162fb5eaaf58a9912d097cc04b

        SHA1

        b44b24f0d36c5abee6f3d94b39f2b75daba8d814

        SHA256

        92eb4633032ab3f492cdbe0a7110b987a09fb25eea4549dc55acf75e919734e8

        SHA512

        378279c51aa223c706de791c6f751e0ca00c7a6c3314b20493e4ea845311f19bee5eaecf8115f436ebd3f0175ce0c365bd4898e16fbadf52168970cdbe8247ff

      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Puo.swf
        MD5

        b44e65e33fa065b2226f00f1235a5660

        SHA1

        05d624d2040911e6f8230a1287174b164229ece4

        SHA256

        9d6270af58c4825ea4e6d7af0d7d257417ca121acd9b22eef33e2c6156be1dd2

        SHA512

        096939fcd9e3d9f089ac10f8bf6037cb34780e0da1330129fbe8c6a38932d04b198102b14650e42d258f38ad177f800d6fbd43f16093bd6dcc2dd41bf69f54ba

      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Ricordarti.exe.com
        MD5

        c56b5f0201a3b3de53e561fe76912bfd

        SHA1

        2a4062e10a5de813f5688221dbeb3f3ff33eb417

        SHA256

        237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

        SHA512

        195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Ricordarti.exe.com
        MD5

        c56b5f0201a3b3de53e561fe76912bfd

        SHA1

        2a4062e10a5de813f5688221dbeb3f3ff33eb417

        SHA256

        237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

        SHA512

        195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Ricordarti.exe.com
        MD5

        c56b5f0201a3b3de53e561fe76912bfd

        SHA1

        2a4062e10a5de813f5688221dbeb3f3ff33eb417

        SHA256

        237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

        SHA512

        195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\V
        MD5

        b44e65e33fa065b2226f00f1235a5660

        SHA1

        05d624d2040911e6f8230a1287174b164229ece4

        SHA256

        9d6270af58c4825ea4e6d7af0d7d257417ca121acd9b22eef33e2c6156be1dd2

        SHA512

        096939fcd9e3d9f089ac10f8bf6037cb34780e0da1330129fbe8c6a38932d04b198102b14650e42d258f38ad177f800d6fbd43f16093bd6dcc2dd41bf69f54ba

      • C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe
        MD5

        8780d7ba86dfc1ed2458065af955e3bd

        SHA1

        4f7992cad4ffcb33dfeb2ace2f4841a69673ace1

        SHA256

        936af73c20296cefdf75829ab7f97951d39e2f8883f3839b70637c78437cc7ad

        SHA512

        1c6c574d3e575f636b41351e9e5f6ca12639cdc052e9376c418e111be874cfe6b1c3e64180c8db63116e6cd5d866749ce76fd5eaeaae7049a03f2d7b4e2b6d8c

      • C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe
        MD5

        8780d7ba86dfc1ed2458065af955e3bd

        SHA1

        4f7992cad4ffcb33dfeb2ace2f4841a69673ace1

        SHA256

        936af73c20296cefdf75829ab7f97951d39e2f8883f3839b70637c78437cc7ad

        SHA512

        1c6c574d3e575f636b41351e9e5f6ca12639cdc052e9376c418e111be874cfe6b1c3e64180c8db63116e6cd5d866749ce76fd5eaeaae7049a03f2d7b4e2b6d8c

      • C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe
        MD5

        7db4e792c59fdfbdbb8b800580a8dd57

        SHA1

        db427b7cdf35815f8e4a64b2d0a47425dbfa4e63

        SHA256

        266b5e041df4957847292fdefb86f8d5763cf085ae2dc6dc2d8f44a9cf94101b

        SHA512

        3509fce4776b9fad49f345913d94763f753140a5076eff4ef37319acdd01c16b31ebc3ebd6b1857338f3bd894bb115741eeccb36ca2637c29c55985028e92414

      • C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe
        MD5

        7db4e792c59fdfbdbb8b800580a8dd57

        SHA1

        db427b7cdf35815f8e4a64b2d0a47425dbfa4e63

        SHA256

        266b5e041df4957847292fdefb86f8d5763cf085ae2dc6dc2d8f44a9cf94101b

        SHA512

        3509fce4776b9fad49f345913d94763f753140a5076eff4ef37319acdd01c16b31ebc3ebd6b1857338f3bd894bb115741eeccb36ca2637c29c55985028e92414

      • C:\Users\Admin\AppData\Local\Temp\VIJXOH~1.DLL
        MD5

        1a868fc4ff989124da1cf06388183dfc

        SHA1

        b03ce44b5512fefba06aa6f555ab39195fa3cde9

        SHA256

        5c5e1972d688a0a3de97a97eacb02e4c040a3bea762930f92b2b6596af280adb

        SHA512

        8a7511788b57919dea9f68b6859c0266e85861c89cd555e2bfe8631e79ca73a8f5266d5b3ff7f81adf7bd4ed7288fe138406d861a8fce254dfd21301cb2bab63

      • C:\Users\Admin\AppData\Local\Temp\syspnhm.vbs
        MD5

        9fc6d1bc31685141796ef8fc17d9faa4

        SHA1

        850eb3696fd5926986d35497ef1a8290dc4fccf2

        SHA256

        ced84dba976c0e58a71fcafbabcc417b34a6dc74ebbb8228c9b85ff09de3b331

        SHA512

        4278e4fdab725f4112ed6928e5b5a17480f3c568cd974932ff5d707cb71a577e5005b5fd9f8d63bd64393877b5bb9d4c61e72bd08b71b00a5127e69f1d6f4d0f

      • C:\Users\Admin\AppData\Local\Temp\tdrteywjfi.vbs
        MD5

        b47923bd009c996c96c65d8962b4bab0

        SHA1

        eb4afe031cca7f5df27133fbe9baba4ff0ca5fd4

        SHA256

        16074a7c5eaa87d3b3d6a8ff6c0b7df2034a349c18226fc728091588485b4bce

        SHA512

        e1ce216aa17ff40c4bcd29ca0d8ba1f8be2d72b7745d361a0e56d63b356130e305e1c04ae5cb28582d8ed615bc1cad1ac2ccde1f9ed5ff2446171406f205d7ae

      • C:\Users\Admin\AppData\Local\Temp\vijxoht.exe
        MD5

        2e91b9f6debd7e0408f3cf36a9482d89

        SHA1

        5e4d49b12797fb68dbdacde639fe3ac19dd23a18

        SHA256

        e546991756ab780d3591e1e24f154e0172ae2da906abbcd97124937b6bd674c6

        SHA512

        7aad01c42011eaeedefd25ad8e73215451db35ac245696db7cc21291851a9ce084a41a34f811eabdae276ac0229ca35c564678bb3d983709a537a30296749b2a

      • C:\Users\Admin\AppData\Local\Temp\vijxoht.exe
        MD5

        2e91b9f6debd7e0408f3cf36a9482d89

        SHA1

        5e4d49b12797fb68dbdacde639fe3ac19dd23a18

        SHA256

        e546991756ab780d3591e1e24f154e0172ae2da906abbcd97124937b6bd674c6

        SHA512

        7aad01c42011eaeedefd25ad8e73215451db35ac245696db7cc21291851a9ce084a41a34f811eabdae276ac0229ca35c564678bb3d983709a537a30296749b2a

      • C:\Users\Admin\AppData\Local\Temp\xAPxbCeXaaMVED.exe
        MD5

        7738da61d18f7da5326367f973671679

        SHA1

        245f1916634daa96ef7432c62dae291ac4002a86

        SHA256

        8f15d3117f5187860694e0af3fab3f6cf30e522c273ac6209ba76ef0ff57a7b2

        SHA512

        b01a3ecae50509fda0051e16c29b6112d21da1a0023e04c8b14bc16495387c985ac52eebe27dbac00e4b6d4aedd49b31a26e6b7dfdf64d4bce89a727c02b26bc

      • C:\Users\Admin\AppData\Local\Temp\xAPxbCeXaaMVED.exe
        MD5

        7738da61d18f7da5326367f973671679

        SHA1

        245f1916634daa96ef7432c62dae291ac4002a86

        SHA256

        8f15d3117f5187860694e0af3fab3f6cf30e522c273ac6209ba76ef0ff57a7b2

        SHA512

        b01a3ecae50509fda0051e16c29b6112d21da1a0023e04c8b14bc16495387c985ac52eebe27dbac00e4b6d4aedd49b31a26e6b7dfdf64d4bce89a727c02b26bc

      • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
        MD5

        8780d7ba86dfc1ed2458065af955e3bd

        SHA1

        4f7992cad4ffcb33dfeb2ace2f4841a69673ace1

        SHA256

        936af73c20296cefdf75829ab7f97951d39e2f8883f3839b70637c78437cc7ad

        SHA512

        1c6c574d3e575f636b41351e9e5f6ca12639cdc052e9376c418e111be874cfe6b1c3e64180c8db63116e6cd5d866749ce76fd5eaeaae7049a03f2d7b4e2b6d8c

      • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
        MD5

        8780d7ba86dfc1ed2458065af955e3bd

        SHA1

        4f7992cad4ffcb33dfeb2ace2f4841a69673ace1

        SHA256

        936af73c20296cefdf75829ab7f97951d39e2f8883f3839b70637c78437cc7ad

        SHA512

        1c6c574d3e575f636b41351e9e5f6ca12639cdc052e9376c418e111be874cfe6b1c3e64180c8db63116e6cd5d866749ce76fd5eaeaae7049a03f2d7b4e2b6d8c

      • \Users\Admin\AppData\Local\Temp\VIJXOH~1.DLL
        MD5

        1a868fc4ff989124da1cf06388183dfc

        SHA1

        b03ce44b5512fefba06aa6f555ab39195fa3cde9

        SHA256

        5c5e1972d688a0a3de97a97eacb02e4c040a3bea762930f92b2b6596af280adb

        SHA512

        8a7511788b57919dea9f68b6859c0266e85861c89cd555e2bfe8631e79ca73a8f5266d5b3ff7f81adf7bd4ed7288fe138406d861a8fce254dfd21301cb2bab63

      • \Users\Admin\AppData\Local\Temp\nsn7FC6.tmp\UAC.dll
        MD5

        adb29e6b186daa765dc750128649b63d

        SHA1

        160cbdc4cb0ac2c142d361df138c537aa7e708c9

        SHA256

        2f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08

        SHA512

        b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada

      • memory/520-148-0x0000000000000000-mapping.dmp
      • memory/520-153-0x0000000002A00000-0x0000000002BEB000-memory.dmp
        Filesize

        1.9MB

      • memory/520-154-0x0000000000400000-0x0000000000AD8000-memory.dmp
        Filesize

        6.8MB

      • memory/752-138-0x0000000002C00000-0x0000000002D4A000-memory.dmp
        Filesize

        1.3MB

      • memory/752-122-0x0000000000000000-mapping.dmp
      • memory/752-143-0x0000000000400000-0x0000000002BFF000-memory.dmp
        Filesize

        40.0MB

      • memory/904-134-0x0000000000000000-mapping.dmp
      • memory/940-151-0x0000000000000000-mapping.dmp
      • memory/1552-129-0x0000000000000000-mapping.dmp
      • memory/2044-140-0x0000000000000000-mapping.dmp
      • memory/2044-145-0x0000000000400000-0x0000000002BFF000-memory.dmp
        Filesize

        40.0MB

      • memory/2044-144-0x0000000002C00000-0x0000000002CAE000-memory.dmp
        Filesize

        696KB

      • memory/2116-114-0x0000000002620000-0x00000000026F1000-memory.dmp
        Filesize

        836KB

      • memory/2116-115-0x0000000000400000-0x0000000000A10000-memory.dmp
        Filesize

        6.1MB

      • memory/2116-157-0x0000000000000000-mapping.dmp
      • memory/2348-128-0x0000000000000000-mapping.dmp
      • memory/2768-136-0x0000000000000000-mapping.dmp
      • memory/2768-146-0x0000000000FB0000-0x0000000000FB1000-memory.dmp
        Filesize

        4KB

      • memory/3140-155-0x0000000000000000-mapping.dmp
      • memory/3288-120-0x0000000000000000-mapping.dmp
      • memory/3932-132-0x0000000000000000-mapping.dmp
      • memory/3976-126-0x0000000000000000-mapping.dmp
      • memory/3984-116-0x0000000000000000-mapping.dmp