Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    15-07-2021 06:39

General

  • Target

    d066ad4ead3311db15867482abe1925b.exe

  • Size

    656KB

  • MD5

    d066ad4ead3311db15867482abe1925b

  • SHA1

    c06c8c4aeed35c7d8a523bb9d489fbceca324dbc

  • SHA256

    af8df57ba3941ed8fa89543e4e98f2da5dfe7a0efaaa72aaca4c54ea9f5ccc58

  • SHA512

    c7f8cd55b69ada93dfd63f23e73636dc503e38545d9c7ee41563009c8879ce8e38f24b7de330e4891e745f0697c754d3d60befa3b23a1bc3d3cb3d2060101710

Malware Config

Extracted

Family

cryptbot

C2

wymbhy32.top

moriue03.top

Attributes
  • payload_url

    http://hofxuo04.top/download.php?file=lv.exe

Signatures

  • CryptBot

    A C++ stealer distributed widely in bundle with other software.

  • CryptBot Payload 2 IoCs
  • Blocklisted process makes network request 4 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 7 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d066ad4ead3311db15867482abe1925b.exe
    "C:\Users\Admin\AppData\Local\Temp\d066ad4ead3311db15867482abe1925b.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:3624
    • C:\Users\Admin\AppData\Local\Temp\lYDElkXZVThI.exe
      "C:\Users\Admin\AppData\Local\Temp\lYDElkXZVThI.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:3428
      • C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe
        "C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2760
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c cmd < Bisognava.swf
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1856
          • C:\Windows\SysWOW64\cmd.exe
            cmd
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2804
            • C:\Windows\SysWOW64\findstr.exe
              findstr /V /R "^qcxKbvvNNXdEjdFxkvFHLYLwwjIiKrlvnbexCySrdBbgBkibkuQJjYRwJzIlNfeKNUyPhkSyDBdpAbmQtkVDhApmFqLobIfwmNBGyapZgKyKIIAkTRyCzm$" Guardi.swf
              6⤵
                PID:3352
              • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Ricordarti.exe.com
                Ricordarti.exe.com V
                6⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:3496
                • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Ricordarti.exe.com
                  C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Ricordarti.exe.com V
                  7⤵
                  • Executes dropped EXE
                  • Checks processor information in registry
                  • Modifies registry class
                  • Suspicious use of WriteProcessMemory
                  PID:2064
                  • C:\Users\Admin\AppData\Local\Temp\pqasaap.exe
                    "C:\Users\Admin\AppData\Local\Temp\pqasaap.exe"
                    8⤵
                    • Executes dropped EXE
                    • Suspicious use of WriteProcessMemory
                    PID:2204
                    • C:\Windows\SysWOW64\rundll32.exe
                      C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\PQASAA~1.DLL,s C:\Users\Admin\AppData\Local\Temp\pqasaap.exe
                      9⤵
                      • Loads dropped DLL
                      PID:2168
                  • C:\Windows\SysWOW64\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\mmmpwia.vbs"
                    8⤵
                      PID:3564
                    • C:\Windows\SysWOW64\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\wihkqwxldah.vbs"
                      8⤵
                      • Blocklisted process makes network request
                      • Modifies system certificate store
                      PID:1536
                • C:\Windows\SysWOW64\PING.EXE
                  ping 127.0.0.1 -n 30
                  6⤵
                  • Runs ping.exe
                  PID:3188
          • C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe
            "C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"
            3⤵
            • Executes dropped EXE
            • Drops startup file
            • Suspicious use of WriteProcessMemory
            PID:1968
            • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
              "C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: AddClipboardFormatListener
              PID:920

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Install Root Certificate

      1
      T1130

      Modify Registry

      1
      T1112

      Credential Access

      Credentials in Files

      3
      T1081

      Discovery

      Query Registry

      2
      T1012

      System Information Discovery

      2
      T1082

      Remote System Discovery

      1
      T1018

      Collection

      Data from Local System

      3
      T1005

      Command and Control

      Web Service

      1
      T1102

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Bisognava.swf
        MD5

        f702abe712e41a829fa4013e68a3d8ab

        SHA1

        f63db1822ac4d842eeb5a8fd9d1986edf18c6c38

        SHA256

        420b92adc8a1a4ca57ac74966a8a6a52684ebb12de25403352aeee0a30e99a30

        SHA512

        473a2440fde483b9ebb673037104095ff648eb5e161e6b1853f40923220d5bc1cff7461294cd382093f0dc0ce5006ab7028e9a1e9b6976ba78e77274eccbca1a

      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Guardi.swf
        MD5

        5d9d75952a8e14b2c34f6baa84becc0a

        SHA1

        57dc9c663b05cc3087b7abf0fbb72db928da59a0

        SHA256

        b5b9c7de312d633f2cd9ea270adb0f04cd2d789ebb71b4f8ad88f429273b861a

        SHA512

        4180ff890b2b2a06430a5b1ddd50db288dda43c0b5bb8900207bcba4b24c0d0d0ecad56159e7fe384cbc04397a17c57d7853e99ab86dc47c922ead7bc01a7e4f

      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Prostro.swf
        MD5

        356d0a162fb5eaaf58a9912d097cc04b

        SHA1

        b44b24f0d36c5abee6f3d94b39f2b75daba8d814

        SHA256

        92eb4633032ab3f492cdbe0a7110b987a09fb25eea4549dc55acf75e919734e8

        SHA512

        378279c51aa223c706de791c6f751e0ca00c7a6c3314b20493e4ea845311f19bee5eaecf8115f436ebd3f0175ce0c365bd4898e16fbadf52168970cdbe8247ff

      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Puo.swf
        MD5

        b44e65e33fa065b2226f00f1235a5660

        SHA1

        05d624d2040911e6f8230a1287174b164229ece4

        SHA256

        9d6270af58c4825ea4e6d7af0d7d257417ca121acd9b22eef33e2c6156be1dd2

        SHA512

        096939fcd9e3d9f089ac10f8bf6037cb34780e0da1330129fbe8c6a38932d04b198102b14650e42d258f38ad177f800d6fbd43f16093bd6dcc2dd41bf69f54ba

      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Ricordarti.exe.com
        MD5

        c56b5f0201a3b3de53e561fe76912bfd

        SHA1

        2a4062e10a5de813f5688221dbeb3f3ff33eb417

        SHA256

        237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

        SHA512

        195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Ricordarti.exe.com
        MD5

        c56b5f0201a3b3de53e561fe76912bfd

        SHA1

        2a4062e10a5de813f5688221dbeb3f3ff33eb417

        SHA256

        237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

        SHA512

        195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Ricordarti.exe.com
        MD5

        c56b5f0201a3b3de53e561fe76912bfd

        SHA1

        2a4062e10a5de813f5688221dbeb3f3ff33eb417

        SHA256

        237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

        SHA512

        195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

      • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\V
        MD5

        b44e65e33fa065b2226f00f1235a5660

        SHA1

        05d624d2040911e6f8230a1287174b164229ece4

        SHA256

        9d6270af58c4825ea4e6d7af0d7d257417ca121acd9b22eef33e2c6156be1dd2

        SHA512

        096939fcd9e3d9f089ac10f8bf6037cb34780e0da1330129fbe8c6a38932d04b198102b14650e42d258f38ad177f800d6fbd43f16093bd6dcc2dd41bf69f54ba

      • C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe
        MD5

        d1aa8f968cf9ba013a801483337df3d8

        SHA1

        f96eab0530d6b263e7206c42e727a29e05f42214

        SHA256

        028537677c7a9e309c339e8ed93bf3cd232f58c1963765e6c11e839ac327d7ae

        SHA512

        cdc23bd824e1c5176cb92f912c3e7fce9001ebae23e3b0ce958058806faad0ae2ed4975068fcea2392b04b9830c8b426b3b129df21cfa739571a1fca0558cc01

      • C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe
        MD5

        d1aa8f968cf9ba013a801483337df3d8

        SHA1

        f96eab0530d6b263e7206c42e727a29e05f42214

        SHA256

        028537677c7a9e309c339e8ed93bf3cd232f58c1963765e6c11e839ac327d7ae

        SHA512

        cdc23bd824e1c5176cb92f912c3e7fce9001ebae23e3b0ce958058806faad0ae2ed4975068fcea2392b04b9830c8b426b3b129df21cfa739571a1fca0558cc01

      • C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe
        MD5

        7db4e792c59fdfbdbb8b800580a8dd57

        SHA1

        db427b7cdf35815f8e4a64b2d0a47425dbfa4e63

        SHA256

        266b5e041df4957847292fdefb86f8d5763cf085ae2dc6dc2d8f44a9cf94101b

        SHA512

        3509fce4776b9fad49f345913d94763f753140a5076eff4ef37319acdd01c16b31ebc3ebd6b1857338f3bd894bb115741eeccb36ca2637c29c55985028e92414

      • C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe
        MD5

        7db4e792c59fdfbdbb8b800580a8dd57

        SHA1

        db427b7cdf35815f8e4a64b2d0a47425dbfa4e63

        SHA256

        266b5e041df4957847292fdefb86f8d5763cf085ae2dc6dc2d8f44a9cf94101b

        SHA512

        3509fce4776b9fad49f345913d94763f753140a5076eff4ef37319acdd01c16b31ebc3ebd6b1857338f3bd894bb115741eeccb36ca2637c29c55985028e92414

      • C:\Users\Admin\AppData\Local\Temp\PQASAA~1.DLL
        MD5

        d7770d5b634ca159561a6dd5207cfd6c

        SHA1

        7f866c67ed72310adfcd85628dd12550ac0f3b2b

        SHA256

        29d4098fff35aafe6702146d10997f390cd4da859a41d38e4eb93d6abaa04a1f

        SHA512

        2074d739e5d1e09916a362f5aa6cc3f774a0031540a7746067bff2b3a5d8d6987636df2159e1b566fd41aa1a7a77a424f6ade247f057f9f1b0d0feb5a6dd0b25

      • C:\Users\Admin\AppData\Local\Temp\lYDElkXZVThI.exe
        MD5

        5cbbdb7bab881f319d1f54c8c76cb4ae

        SHA1

        c502b3e3d5e1859e1089a5e1b09f7b8d0a44dc7b

        SHA256

        719cf0c9eba47af19500753dc4213f551efdc09f13e2c71ef0e39b08a7aca888

        SHA512

        298df0d61d338d16ac2bd26f3cc2c3b2d5c4859b88251a5932b73f6b7dbdfb5d1a67d257c6da39f75439abc9091c0a0d360e3f297689f02d179e530c143df805

      • C:\Users\Admin\AppData\Local\Temp\lYDElkXZVThI.exe
        MD5

        5cbbdb7bab881f319d1f54c8c76cb4ae

        SHA1

        c502b3e3d5e1859e1089a5e1b09f7b8d0a44dc7b

        SHA256

        719cf0c9eba47af19500753dc4213f551efdc09f13e2c71ef0e39b08a7aca888

        SHA512

        298df0d61d338d16ac2bd26f3cc2c3b2d5c4859b88251a5932b73f6b7dbdfb5d1a67d257c6da39f75439abc9091c0a0d360e3f297689f02d179e530c143df805

      • C:\Users\Admin\AppData\Local\Temp\mmmpwia.vbs
        MD5

        20504f531fa0a72f5bcc20507236886b

        SHA1

        ffd0e5dfe99010af4944f6bc11d5d913d8e6bbbc

        SHA256

        af6e3cc576b389617ec27d9f98bdb165232f7da988fdc44529647a9d190c8110

        SHA512

        6f078f6940e96b14ecddac7875c45ffebbac5fa7152c08da479c30ae551ec7b10b7b5902f46cc44b2fa5eb65937b18ed563def5fad9449fdbeebbdb61a265eb7

      • C:\Users\Admin\AppData\Local\Temp\pqasaap.exe
        MD5

        401f8adb90217a4df364c9ac47d71cfd

        SHA1

        cc2fd78a812f2ea9f3420441b2070b883e5547d5

        SHA256

        ae3562b8c4f039b5483e3db92b0e234e7e8475d9518667f6b6b6756e2ddeb912

        SHA512

        32593c3db5afa6be33eeff1ca292b8e89722349fea31316c2d4667c6b4ae161db8033b392331e859fdecb05cf59809f1438aa20de86c081e5d8a394f89778e08

      • C:\Users\Admin\AppData\Local\Temp\pqasaap.exe
        MD5

        401f8adb90217a4df364c9ac47d71cfd

        SHA1

        cc2fd78a812f2ea9f3420441b2070b883e5547d5

        SHA256

        ae3562b8c4f039b5483e3db92b0e234e7e8475d9518667f6b6b6756e2ddeb912

        SHA512

        32593c3db5afa6be33eeff1ca292b8e89722349fea31316c2d4667c6b4ae161db8033b392331e859fdecb05cf59809f1438aa20de86c081e5d8a394f89778e08

      • C:\Users\Admin\AppData\Local\Temp\wihkqwxldah.vbs
        MD5

        e426971bf60b760d9f5d314af4ee7892

        SHA1

        38086bc8a6a210d6d3c497369b3417ff80ce7ac3

        SHA256

        fb1fb1cf991ce7c40941f84c31778c6d686149f8ea1389414a47f21b3b5c03ea

        SHA512

        dd311b71bc66069c45cc6bef92008d784f75337c24aac86b2b6c51284ea3a1da3058a8d1bf1534ea96f1e697193677c7e8f475f8809c3fcac48ac22aeaf3fefd

      • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
        MD5

        d1aa8f968cf9ba013a801483337df3d8

        SHA1

        f96eab0530d6b263e7206c42e727a29e05f42214

        SHA256

        028537677c7a9e309c339e8ed93bf3cd232f58c1963765e6c11e839ac327d7ae

        SHA512

        cdc23bd824e1c5176cb92f912c3e7fce9001ebae23e3b0ce958058806faad0ae2ed4975068fcea2392b04b9830c8b426b3b129df21cfa739571a1fca0558cc01

      • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
        MD5

        d1aa8f968cf9ba013a801483337df3d8

        SHA1

        f96eab0530d6b263e7206c42e727a29e05f42214

        SHA256

        028537677c7a9e309c339e8ed93bf3cd232f58c1963765e6c11e839ac327d7ae

        SHA512

        cdc23bd824e1c5176cb92f912c3e7fce9001ebae23e3b0ce958058806faad0ae2ed4975068fcea2392b04b9830c8b426b3b129df21cfa739571a1fca0558cc01

      • \Users\Admin\AppData\Local\Temp\PQASAA~1.DLL
        MD5

        d7770d5b634ca159561a6dd5207cfd6c

        SHA1

        7f866c67ed72310adfcd85628dd12550ac0f3b2b

        SHA256

        29d4098fff35aafe6702146d10997f390cd4da859a41d38e4eb93d6abaa04a1f

        SHA512

        2074d739e5d1e09916a362f5aa6cc3f774a0031540a7746067bff2b3a5d8d6987636df2159e1b566fd41aa1a7a77a424f6ade247f057f9f1b0d0feb5a6dd0b25

      • \Users\Admin\AppData\Local\Temp\nsb4964.tmp\UAC.dll
        MD5

        adb29e6b186daa765dc750128649b63d

        SHA1

        160cbdc4cb0ac2c142d361df138c537aa7e708c9

        SHA256

        2f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08

        SHA512

        b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada

      • memory/920-144-0x0000000000A30000-0x0000000000B7A000-memory.dmp
        Filesize

        1.3MB

      • memory/920-145-0x0000000000400000-0x00000000009A9000-memory.dmp
        Filesize

        5.7MB

      • memory/920-139-0x0000000000000000-mapping.dmp
      • memory/1536-155-0x0000000000000000-mapping.dmp
      • memory/1856-126-0x0000000000000000-mapping.dmp
      • memory/1968-142-0x0000000000A00000-0x0000000000A26000-memory.dmp
        Filesize

        152KB

      • memory/1968-143-0x0000000000400000-0x00000000009A9000-memory.dmp
        Filesize

        5.7MB

      • memory/1968-123-0x0000000000000000-mapping.dmp
      • memory/2064-136-0x0000000000000000-mapping.dmp
      • memory/2064-146-0x00000000016A0000-0x00000000016A1000-memory.dmp
        Filesize

        4KB

      • memory/2168-157-0x0000000000000000-mapping.dmp
      • memory/2204-148-0x0000000000000000-mapping.dmp
      • memory/2204-154-0x0000000000400000-0x0000000000AE9000-memory.dmp
        Filesize

        6.9MB

      • memory/2204-153-0x00000000029B0000-0x0000000002B9B000-memory.dmp
        Filesize

        1.9MB

      • memory/2760-120-0x0000000000000000-mapping.dmp
      • memory/2804-128-0x0000000000000000-mapping.dmp
      • memory/3188-134-0x0000000000000000-mapping.dmp
      • memory/3352-129-0x0000000000000000-mapping.dmp
      • memory/3428-116-0x0000000000000000-mapping.dmp
      • memory/3496-132-0x0000000000000000-mapping.dmp
      • memory/3564-151-0x0000000000000000-mapping.dmp
      • memory/3624-114-0x0000000002630000-0x0000000002701000-memory.dmp
        Filesize

        836KB

      • memory/3624-115-0x0000000000400000-0x0000000000A10000-memory.dmp
        Filesize

        6.1MB