Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
15-07-2021 06:39
Static task
static1
Behavioral task
behavioral1
Sample
d066ad4ead3311db15867482abe1925b.exe
Resource
win7v20210408
General
-
Target
d066ad4ead3311db15867482abe1925b.exe
-
Size
656KB
-
MD5
d066ad4ead3311db15867482abe1925b
-
SHA1
c06c8c4aeed35c7d8a523bb9d489fbceca324dbc
-
SHA256
af8df57ba3941ed8fa89543e4e98f2da5dfe7a0efaaa72aaca4c54ea9f5ccc58
-
SHA512
c7f8cd55b69ada93dfd63f23e73636dc503e38545d9c7ee41563009c8879ce8e38f24b7de330e4891e745f0697c754d3d60befa3b23a1bc3d3cb3d2060101710
Malware Config
Extracted
cryptbot
wymbhy32.top
moriue03.top
-
payload_url
http://hofxuo04.top/download.php?file=lv.exe
Signatures
-
CryptBot Payload 2 IoCs
resource yara_rule behavioral2/memory/3624-115-0x0000000000400000-0x0000000000A10000-memory.dmp family_cryptbot behavioral2/memory/3624-114-0x0000000002630000-0x0000000002701000-memory.dmp family_cryptbot -
Blocklisted process makes network request 4 IoCs
flow pid Process 38 1536 WScript.exe 40 1536 WScript.exe 42 1536 WScript.exe 44 1536 WScript.exe -
Downloads MZ/PE file
-
Executes dropped EXE 7 IoCs
pid Process 3428 lYDElkXZVThI.exe 2760 vpn.exe 1968 4.exe 3496 Ricordarti.exe.com 2064 Ricordarti.exe.com 920 SmartClock.exe 2204 pqasaap.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SmartClock.lnk 4.exe -
Loads dropped DLL 2 IoCs
pid Process 3428 lYDElkXZVThI.exe 2168 rundll32.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 21 ip-api.com -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\foler\olader\acledit.dll lYDElkXZVThI.exe File created C:\Program Files (x86)\foler\olader\acppage.dll lYDElkXZVThI.exe File created C:\Program Files (x86)\foler\olader\adprovider.dll lYDElkXZVThI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString d066ad4ead3311db15867482abe1925b.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Ricordarti.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Ricordarti.exe.com Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 d066ad4ead3311db15867482abe1925b.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings Ricordarti.exe.com -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 WScript.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 5c000000010000000400000000080000090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e WScript.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3188 PING.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 920 SmartClock.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 3624 wrote to memory of 3428 3624 d066ad4ead3311db15867482abe1925b.exe 78 PID 3624 wrote to memory of 3428 3624 d066ad4ead3311db15867482abe1925b.exe 78 PID 3624 wrote to memory of 3428 3624 d066ad4ead3311db15867482abe1925b.exe 78 PID 3428 wrote to memory of 2760 3428 lYDElkXZVThI.exe 79 PID 3428 wrote to memory of 2760 3428 lYDElkXZVThI.exe 79 PID 3428 wrote to memory of 2760 3428 lYDElkXZVThI.exe 79 PID 3428 wrote to memory of 1968 3428 lYDElkXZVThI.exe 80 PID 3428 wrote to memory of 1968 3428 lYDElkXZVThI.exe 80 PID 3428 wrote to memory of 1968 3428 lYDElkXZVThI.exe 80 PID 2760 wrote to memory of 1856 2760 vpn.exe 81 PID 2760 wrote to memory of 1856 2760 vpn.exe 81 PID 2760 wrote to memory of 1856 2760 vpn.exe 81 PID 1856 wrote to memory of 2804 1856 cmd.exe 83 PID 1856 wrote to memory of 2804 1856 cmd.exe 83 PID 1856 wrote to memory of 2804 1856 cmd.exe 83 PID 2804 wrote to memory of 3352 2804 cmd.exe 84 PID 2804 wrote to memory of 3352 2804 cmd.exe 84 PID 2804 wrote to memory of 3352 2804 cmd.exe 84 PID 2804 wrote to memory of 3496 2804 cmd.exe 85 PID 2804 wrote to memory of 3496 2804 cmd.exe 85 PID 2804 wrote to memory of 3496 2804 cmd.exe 85 PID 2804 wrote to memory of 3188 2804 cmd.exe 86 PID 2804 wrote to memory of 3188 2804 cmd.exe 86 PID 2804 wrote to memory of 3188 2804 cmd.exe 86 PID 3496 wrote to memory of 2064 3496 Ricordarti.exe.com 87 PID 3496 wrote to memory of 2064 3496 Ricordarti.exe.com 87 PID 3496 wrote to memory of 2064 3496 Ricordarti.exe.com 87 PID 1968 wrote to memory of 920 1968 4.exe 88 PID 1968 wrote to memory of 920 1968 4.exe 88 PID 1968 wrote to memory of 920 1968 4.exe 88 PID 2064 wrote to memory of 2204 2064 Ricordarti.exe.com 91 PID 2064 wrote to memory of 2204 2064 Ricordarti.exe.com 91 PID 2064 wrote to memory of 2204 2064 Ricordarti.exe.com 91 PID 2064 wrote to memory of 3564 2064 Ricordarti.exe.com 92 PID 2064 wrote to memory of 3564 2064 Ricordarti.exe.com 92 PID 2064 wrote to memory of 3564 2064 Ricordarti.exe.com 92 PID 2064 wrote to memory of 1536 2064 Ricordarti.exe.com 93 PID 2064 wrote to memory of 1536 2064 Ricordarti.exe.com 93 PID 2064 wrote to memory of 1536 2064 Ricordarti.exe.com 93 PID 2204 wrote to memory of 2168 2204 pqasaap.exe 94 PID 2204 wrote to memory of 2168 2204 pqasaap.exe 94 PID 2204 wrote to memory of 2168 2204 pqasaap.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\d066ad4ead3311db15867482abe1925b.exe"C:\Users\Admin\AppData\Local\Temp\d066ad4ead3311db15867482abe1925b.exe"1⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\lYDElkXZVThI.exe"C:\Users\Admin\AppData\Local\Temp\lYDElkXZVThI.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Bisognava.swf4⤵
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\cmd.execmd5⤵
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^qcxKbvvNNXdEjdFxkvFHLYLwwjIiKrlvnbexCySrdBbgBkibkuQJjYRwJzIlNfeKNUyPhkSyDBdpAbmQtkVDhApmFqLobIfwmNBGyapZgKyKIIAkTRyCzm$" Guardi.swf6⤵PID:3352
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Ricordarti.exe.comRicordarti.exe.com V6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Ricordarti.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Ricordarti.exe.com V7⤵
- Executes dropped EXE
- Checks processor information in registry
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\pqasaap.exe"C:\Users\Admin\AppData\Local\Temp\pqasaap.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\PQASAA~1.DLL,s C:\Users\Admin\AppData\Local\Temp\pqasaap.exe9⤵
- Loads dropped DLL
PID:2168
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\mmmpwia.vbs"8⤵PID:3564
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\wihkqwxldah.vbs"8⤵
- Blocklisted process makes network request
- Modifies system certificate store
PID:1536
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 306⤵
- Runs ping.exe
PID:3188
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"3⤵
- Executes dropped EXE
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
PID:920
-
-
-