Analysis
-
max time kernel
115s -
max time network
119s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
15-07-2021 09:37
Static task
static1
Behavioral task
behavioral1
Sample
33a16e2862754c9f4bc6711a4517dac4.exe
Resource
win7v20210410
General
-
Target
33a16e2862754c9f4bc6711a4517dac4.exe
-
Size
676KB
-
MD5
33a16e2862754c9f4bc6711a4517dac4
-
SHA1
841aa45a975c073ed25627fba062bad741de97cc
-
SHA256
df85a38611751933558ef9e7da81e81025ffc5e5e92cedaf4d97fb0b9f147422
-
SHA512
b1b34246d33cf916a4b5d4899a46139be4d3ac4aaa2279080e92e4e5090670902a42dccbcf90a382ddafda4449e8ba3da3b52e11c7ff859744e88f13b82913ba
Malware Config
Extracted
cryptbot
wymbdu42.top
morkus04.top
-
payload_url
http://hofiwb05.top/download.php?file=lv.exe
Signatures
-
CryptBot Payload 2 IoCs
resource yara_rule behavioral2/memory/3904-114-0x00000000026E0000-0x00000000027B1000-memory.dmp family_cryptbot behavioral2/memory/3904-115-0x0000000000400000-0x0000000000A24000-memory.dmp family_cryptbot -
Blocklisted process makes network request 4 IoCs
flow pid Process 39 3932 WScript.exe 41 3932 WScript.exe 43 3932 WScript.exe 45 3932 WScript.exe -
Downloads MZ/PE file
-
Executes dropped EXE 7 IoCs
pid Process 3344 WJAosvQKwN.exe 3296 vpn.exe 3920 4.exe 4000 Voi.exe.com 3512 Voi.exe.com 2388 SmartClock.exe 2656 puxjolgm.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk 4.exe -
Loads dropped DLL 2 IoCs
pid Process 3344 WJAosvQKwN.exe 2772 rundll32.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 23 ip-api.com -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\foler\olader\acppage.dll WJAosvQKwN.exe File created C:\Program Files (x86)\foler\olader\adprovider.dll WJAosvQKwN.exe File created C:\Program Files (x86)\foler\olader\acledit.dll WJAosvQKwN.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Voi.exe.com Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 33a16e2862754c9f4bc6711a4517dac4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 33a16e2862754c9f4bc6711a4517dac4.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Voi.exe.com -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings Voi.exe.com -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 5c000000010000000400000000080000090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e WScript.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2728 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2388 SmartClock.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 3904 wrote to memory of 3344 3904 33a16e2862754c9f4bc6711a4517dac4.exe 79 PID 3904 wrote to memory of 3344 3904 33a16e2862754c9f4bc6711a4517dac4.exe 79 PID 3904 wrote to memory of 3344 3904 33a16e2862754c9f4bc6711a4517dac4.exe 79 PID 3344 wrote to memory of 3296 3344 WJAosvQKwN.exe 80 PID 3344 wrote to memory of 3296 3344 WJAosvQKwN.exe 80 PID 3344 wrote to memory of 3296 3344 WJAosvQKwN.exe 80 PID 3344 wrote to memory of 3920 3344 WJAosvQKwN.exe 81 PID 3344 wrote to memory of 3920 3344 WJAosvQKwN.exe 81 PID 3344 wrote to memory of 3920 3344 WJAosvQKwN.exe 81 PID 3296 wrote to memory of 3988 3296 vpn.exe 82 PID 3296 wrote to memory of 3988 3296 vpn.exe 82 PID 3296 wrote to memory of 3988 3296 vpn.exe 82 PID 3988 wrote to memory of 1572 3988 cmd.exe 84 PID 3988 wrote to memory of 1572 3988 cmd.exe 84 PID 3988 wrote to memory of 1572 3988 cmd.exe 84 PID 1572 wrote to memory of 1456 1572 cmd.exe 85 PID 1572 wrote to memory of 1456 1572 cmd.exe 85 PID 1572 wrote to memory of 1456 1572 cmd.exe 85 PID 1572 wrote to memory of 4000 1572 cmd.exe 86 PID 1572 wrote to memory of 4000 1572 cmd.exe 86 PID 1572 wrote to memory of 4000 1572 cmd.exe 86 PID 1572 wrote to memory of 2728 1572 cmd.exe 87 PID 1572 wrote to memory of 2728 1572 cmd.exe 87 PID 1572 wrote to memory of 2728 1572 cmd.exe 87 PID 4000 wrote to memory of 3512 4000 Voi.exe.com 88 PID 4000 wrote to memory of 3512 4000 Voi.exe.com 88 PID 4000 wrote to memory of 3512 4000 Voi.exe.com 88 PID 3920 wrote to memory of 2388 3920 4.exe 89 PID 3920 wrote to memory of 2388 3920 4.exe 89 PID 3920 wrote to memory of 2388 3920 4.exe 89 PID 3512 wrote to memory of 2656 3512 Voi.exe.com 92 PID 3512 wrote to memory of 2656 3512 Voi.exe.com 92 PID 3512 wrote to memory of 2656 3512 Voi.exe.com 92 PID 3512 wrote to memory of 2964 3512 Voi.exe.com 93 PID 3512 wrote to memory of 2964 3512 Voi.exe.com 93 PID 3512 wrote to memory of 2964 3512 Voi.exe.com 93 PID 3512 wrote to memory of 3932 3512 Voi.exe.com 94 PID 3512 wrote to memory of 3932 3512 Voi.exe.com 94 PID 3512 wrote to memory of 3932 3512 Voi.exe.com 94 PID 2656 wrote to memory of 2772 2656 puxjolgm.exe 95 PID 2656 wrote to memory of 2772 2656 puxjolgm.exe 95 PID 2656 wrote to memory of 2772 2656 puxjolgm.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\33a16e2862754c9f4bc6711a4517dac4.exe"C:\Users\Admin\AppData\Local\Temp\33a16e2862754c9f4bc6711a4517dac4.exe"1⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\WJAosvQKwN.exe"C:\Users\Admin\AppData\Local\Temp\WJAosvQKwN.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Bianchi.ppsm4⤵
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\SysWOW64\cmd.execmd5⤵
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^ahMoGSRFPvYGRbZRASvPhIMskIHSqfHwlgeTRduArwTXhLwonqjVmJPKAcWXlZFmPWvDcuZlLWLkOPrAGmzZ$" Accorrendo.ppsm6⤵PID:1456
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Voi.exe.comVoi.exe.com v6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Voi.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Voi.exe.com v7⤵
- Executes dropped EXE
- Checks processor information in registry
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\puxjolgm.exe"C:\Users\Admin\AppData\Local\Temp\puxjolgm.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\PUXJOL~1.DLL,s C:\Users\Admin\AppData\Local\Temp\puxjolgm.exe9⤵
- Loads dropped DLL
PID:2772
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\rwkghkmmh.vbs"8⤵PID:2964
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\yrhkesgu.vbs"8⤵
- Blocklisted process makes network request
- Modifies system certificate store
PID:3932
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 306⤵
- Runs ping.exe
PID:2728
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"3⤵
- Executes dropped EXE
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
PID:2388
-
-
-