Analysis
-
max time kernel
148s -
max time network
157s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
15-07-2021 09:49
Static task
static1
Behavioral task
behavioral1
Sample
58fa567894c7dc28d2b7f0d7f3886512.exe
Resource
win7v20210410
General
-
Target
58fa567894c7dc28d2b7f0d7f3886512.exe
-
Size
721KB
-
MD5
58fa567894c7dc28d2b7f0d7f3886512
-
SHA1
d8b23608392d87729b6512046f926d83ec27ffd1
-
SHA256
7e19416205cfb8e056d4628bdeb635e29cefba04fcb21ee55e7b0077427e4c99
-
SHA512
a3e45bb8656c53ae0af2a06363013b0379f7370418013ed83d48d4a8af4f70ac0f50ecbb02287480d3f79dd1c5e12e3949e44adf071d03cf4409f6e40592d5b2
Malware Config
Extracted
cryptbot
wymbhy32.top
moriue03.top
-
payload_url
http://hofxuo04.top/download.php?file=lv.exe
Signatures
-
CryptBot Payload 4 IoCs
resource yara_rule behavioral2/memory/364-114-0x0000000002760000-0x0000000002831000-memory.dmp family_cryptbot behavioral2/memory/364-115-0x0000000000400000-0x0000000000A20000-memory.dmp family_cryptbot behavioral2/memory/3356-142-0x00000000009B0000-0x0000000000AFA000-memory.dmp family_cryptbot behavioral2/memory/1800-144-0x0000000000AA0000-0x0000000000BEA000-memory.dmp family_cryptbot -
Blocklisted process makes network request 4 IoCs
flow pid Process 39 2088 WScript.exe 41 2088 WScript.exe 43 2088 WScript.exe 45 2088 WScript.exe -
Downloads MZ/PE file
-
Executes dropped EXE 7 IoCs
pid Process 2376 OJDTunFJqbY.exe 1280 vpn.exe 3356 4.exe 3836 Ricordarti.exe.com 3236 Ricordarti.exe.com 1800 SmartClock.exe 732 jhghnsjam.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk 4.exe -
Loads dropped DLL 2 IoCs
pid Process 2376 OJDTunFJqbY.exe 2676 rundll32.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 22 ip-api.com -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\foler\olader\acppage.dll OJDTunFJqbY.exe File created C:\Program Files (x86)\foler\olader\adprovider.dll OJDTunFJqbY.exe File created C:\Program Files (x86)\foler\olader\acledit.dll OJDTunFJqbY.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 58fa567894c7dc28d2b7f0d7f3886512.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 58fa567894c7dc28d2b7f0d7f3886512.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Ricordarti.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Ricordarti.exe.com -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings Ricordarti.exe.com -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 WScript.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4064 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1800 SmartClock.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 364 wrote to memory of 2376 364 58fa567894c7dc28d2b7f0d7f3886512.exe 77 PID 364 wrote to memory of 2376 364 58fa567894c7dc28d2b7f0d7f3886512.exe 77 PID 364 wrote to memory of 2376 364 58fa567894c7dc28d2b7f0d7f3886512.exe 77 PID 2376 wrote to memory of 1280 2376 OJDTunFJqbY.exe 78 PID 2376 wrote to memory of 1280 2376 OJDTunFJqbY.exe 78 PID 2376 wrote to memory of 1280 2376 OJDTunFJqbY.exe 78 PID 2376 wrote to memory of 3356 2376 OJDTunFJqbY.exe 79 PID 2376 wrote to memory of 3356 2376 OJDTunFJqbY.exe 79 PID 2376 wrote to memory of 3356 2376 OJDTunFJqbY.exe 79 PID 1280 wrote to memory of 1004 1280 vpn.exe 80 PID 1280 wrote to memory of 1004 1280 vpn.exe 80 PID 1280 wrote to memory of 1004 1280 vpn.exe 80 PID 1004 wrote to memory of 2052 1004 cmd.exe 82 PID 1004 wrote to memory of 2052 1004 cmd.exe 82 PID 1004 wrote to memory of 2052 1004 cmd.exe 82 PID 2052 wrote to memory of 3796 2052 cmd.exe 83 PID 2052 wrote to memory of 3796 2052 cmd.exe 83 PID 2052 wrote to memory of 3796 2052 cmd.exe 83 PID 2052 wrote to memory of 3836 2052 cmd.exe 85 PID 2052 wrote to memory of 3836 2052 cmd.exe 85 PID 2052 wrote to memory of 3836 2052 cmd.exe 85 PID 2052 wrote to memory of 4064 2052 cmd.exe 86 PID 2052 wrote to memory of 4064 2052 cmd.exe 86 PID 2052 wrote to memory of 4064 2052 cmd.exe 86 PID 3836 wrote to memory of 3236 3836 Ricordarti.exe.com 87 PID 3836 wrote to memory of 3236 3836 Ricordarti.exe.com 87 PID 3836 wrote to memory of 3236 3836 Ricordarti.exe.com 87 PID 3356 wrote to memory of 1800 3356 4.exe 88 PID 3356 wrote to memory of 1800 3356 4.exe 88 PID 3356 wrote to memory of 1800 3356 4.exe 88 PID 3236 wrote to memory of 732 3236 Ricordarti.exe.com 89 PID 3236 wrote to memory of 732 3236 Ricordarti.exe.com 89 PID 3236 wrote to memory of 732 3236 Ricordarti.exe.com 89 PID 3236 wrote to memory of 2952 3236 Ricordarti.exe.com 90 PID 3236 wrote to memory of 2952 3236 Ricordarti.exe.com 90 PID 3236 wrote to memory of 2952 3236 Ricordarti.exe.com 90 PID 3236 wrote to memory of 2088 3236 Ricordarti.exe.com 91 PID 3236 wrote to memory of 2088 3236 Ricordarti.exe.com 91 PID 3236 wrote to memory of 2088 3236 Ricordarti.exe.com 91 PID 732 wrote to memory of 2676 732 jhghnsjam.exe 92 PID 732 wrote to memory of 2676 732 jhghnsjam.exe 92 PID 732 wrote to memory of 2676 732 jhghnsjam.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\58fa567894c7dc28d2b7f0d7f3886512.exe"C:\Users\Admin\AppData\Local\Temp\58fa567894c7dc28d2b7f0d7f3886512.exe"1⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Users\Admin\AppData\Local\Temp\OJDTunFJqbY.exe"C:\Users\Admin\AppData\Local\Temp\OJDTunFJqbY.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Bisognava.swf4⤵
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\SysWOW64\cmd.execmd5⤵
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^qcxKbvvNNXdEjdFxkvFHLYLwwjIiKrlvnbexCySrdBbgBkibkuQJjYRwJzIlNfeKNUyPhkSyDBdpAbmQtkVDhApmFqLobIfwmNBGyapZgKyKIIAkTRyCzm$" Guardi.swf6⤵PID:3796
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Ricordarti.exe.comRicordarti.exe.com V6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Ricordarti.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Ricordarti.exe.com V7⤵
- Executes dropped EXE
- Checks processor information in registry
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Users\Admin\AppData\Local\Temp\jhghnsjam.exe"C:\Users\Admin\AppData\Local\Temp\jhghnsjam.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:732 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\JHGHNS~1.DLL,s C:\Users\Admin\AppData\Local\Temp\JHGHNS~1.EXE9⤵
- Loads dropped DLL
PID:2676
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\lajvrenkmd.vbs"8⤵PID:2952
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\kpaatoetal.vbs"8⤵
- Blocklisted process makes network request
- Modifies system certificate store
PID:2088
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 306⤵
- Runs ping.exe
PID:4064
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"3⤵
- Executes dropped EXE
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
PID:1800
-
-
-