Analysis
-
max time kernel
122s -
max time network
151s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
15-07-2021 09:51
Static task
static1
Behavioral task
behavioral1
Sample
ec36989321fb62bb857a24a53d1491fd.exe
Resource
win7v20210410
General
-
Target
ec36989321fb62bb857a24a53d1491fd.exe
-
Size
694KB
-
MD5
ec36989321fb62bb857a24a53d1491fd
-
SHA1
28de531b6da8f80b0452c109dcf30bc1efee23f9
-
SHA256
eb4e54c1372f7002b2b49a9918e67f84d65e52f1b12c5b7313420a48d5305e41
-
SHA512
e71009f296d2b9cb07c6a30fe0798db527aa756177478116b53067e8b55ae17d2ebdb7b4ecb9587fe052d424fa643e9bf3ecd0821d613a0545f8546702c722b7
Malware Config
Extracted
cryptbot
wymbdu42.top
morkus04.top
-
payload_url
http://hofiwb05.top/download.php?file=lv.exe
Signatures
-
CryptBot Payload 2 IoCs
resource yara_rule behavioral2/memory/1400-114-0x00000000028F0000-0x00000000029C1000-memory.dmp family_cryptbot behavioral2/memory/1400-115-0x0000000000400000-0x0000000000A28000-memory.dmp family_cryptbot -
Blocklisted process makes network request 4 IoCs
flow pid Process 37 604 WScript.exe 39 604 WScript.exe 41 604 WScript.exe 43 604 WScript.exe -
Downloads MZ/PE file
-
Executes dropped EXE 7 IoCs
pid Process 3144 NMhjlYkYHKMW.exe 744 vpn.exe 3948 4.exe 2904 Voi.exe.com 1824 Voi.exe.com 1456 SmartClock.exe 3172 mauwkgtnlnvh.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk 4.exe -
Loads dropped DLL 2 IoCs
pid Process 3144 NMhjlYkYHKMW.exe 3956 rundll32.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 23 ip-api.com -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\foler\olader\acppage.dll NMhjlYkYHKMW.exe File created C:\Program Files (x86)\foler\olader\adprovider.dll NMhjlYkYHKMW.exe File created C:\Program Files (x86)\foler\olader\acledit.dll NMhjlYkYHKMW.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ec36989321fb62bb857a24a53d1491fd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ec36989321fb62bb857a24a53d1491fd.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Voi.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Voi.exe.com -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\Local Settings Voi.exe.com -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 5c000000010000000400000000080000090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e WScript.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1188 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1456 SmartClock.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 1400 wrote to memory of 3144 1400 ec36989321fb62bb857a24a53d1491fd.exe 78 PID 1400 wrote to memory of 3144 1400 ec36989321fb62bb857a24a53d1491fd.exe 78 PID 1400 wrote to memory of 3144 1400 ec36989321fb62bb857a24a53d1491fd.exe 78 PID 3144 wrote to memory of 744 3144 NMhjlYkYHKMW.exe 79 PID 3144 wrote to memory of 744 3144 NMhjlYkYHKMW.exe 79 PID 3144 wrote to memory of 744 3144 NMhjlYkYHKMW.exe 79 PID 3144 wrote to memory of 3948 3144 NMhjlYkYHKMW.exe 80 PID 3144 wrote to memory of 3948 3144 NMhjlYkYHKMW.exe 80 PID 3144 wrote to memory of 3948 3144 NMhjlYkYHKMW.exe 80 PID 744 wrote to memory of 1228 744 vpn.exe 81 PID 744 wrote to memory of 1228 744 vpn.exe 81 PID 744 wrote to memory of 1228 744 vpn.exe 81 PID 1228 wrote to memory of 2992 1228 cmd.exe 83 PID 1228 wrote to memory of 2992 1228 cmd.exe 83 PID 1228 wrote to memory of 2992 1228 cmd.exe 83 PID 2992 wrote to memory of 2096 2992 cmd.exe 84 PID 2992 wrote to memory of 2096 2992 cmd.exe 84 PID 2992 wrote to memory of 2096 2992 cmd.exe 84 PID 2992 wrote to memory of 2904 2992 cmd.exe 85 PID 2992 wrote to memory of 2904 2992 cmd.exe 85 PID 2992 wrote to memory of 2904 2992 cmd.exe 85 PID 2992 wrote to memory of 1188 2992 cmd.exe 86 PID 2992 wrote to memory of 1188 2992 cmd.exe 86 PID 2992 wrote to memory of 1188 2992 cmd.exe 86 PID 2904 wrote to memory of 1824 2904 Voi.exe.com 87 PID 2904 wrote to memory of 1824 2904 Voi.exe.com 87 PID 2904 wrote to memory of 1824 2904 Voi.exe.com 87 PID 3948 wrote to memory of 1456 3948 4.exe 88 PID 3948 wrote to memory of 1456 3948 4.exe 88 PID 3948 wrote to memory of 1456 3948 4.exe 88 PID 1824 wrote to memory of 3172 1824 Voi.exe.com 89 PID 1824 wrote to memory of 3172 1824 Voi.exe.com 89 PID 1824 wrote to memory of 3172 1824 Voi.exe.com 89 PID 1824 wrote to memory of 2300 1824 Voi.exe.com 90 PID 1824 wrote to memory of 2300 1824 Voi.exe.com 90 PID 1824 wrote to memory of 2300 1824 Voi.exe.com 90 PID 1824 wrote to memory of 604 1824 Voi.exe.com 91 PID 1824 wrote to memory of 604 1824 Voi.exe.com 91 PID 1824 wrote to memory of 604 1824 Voi.exe.com 91 PID 3172 wrote to memory of 3956 3172 mauwkgtnlnvh.exe 92 PID 3172 wrote to memory of 3956 3172 mauwkgtnlnvh.exe 92 PID 3172 wrote to memory of 3956 3172 mauwkgtnlnvh.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec36989321fb62bb857a24a53d1491fd.exe"C:\Users\Admin\AppData\Local\Temp\ec36989321fb62bb857a24a53d1491fd.exe"1⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\NMhjlYkYHKMW.exe"C:\Users\Admin\AppData\Local\Temp\NMhjlYkYHKMW.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Bianchi.ppsm4⤵
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\SysWOW64\cmd.execmd5⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^ahMoGSRFPvYGRbZRASvPhIMskIHSqfHwlgeTRduArwTXhLwonqjVmJPKAcWXlZFmPWvDcuZlLWLkOPrAGmzZ$" Accorrendo.ppsm6⤵PID:2096
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Voi.exe.comVoi.exe.com v6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Voi.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Voi.exe.com v7⤵
- Executes dropped EXE
- Checks processor information in registry
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\mauwkgtnlnvh.exe"C:\Users\Admin\AppData\Local\Temp\mauwkgtnlnvh.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\MAUWKG~1.DLL,s C:\Users\Admin\AppData\Local\Temp\MAUWKG~1.EXE9⤵
- Loads dropped DLL
PID:3956
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\rsphxvqx.vbs"8⤵PID:2300
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\hhlapyl.vbs"8⤵
- Blocklisted process makes network request
- Modifies system certificate store
PID:604
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 306⤵
- Runs ping.exe
PID:1188
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"3⤵
- Executes dropped EXE
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
PID:1456
-
-
-