Analysis

  • max time kernel
    95s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    27-07-2021 15:48

General

  • Target

    3aa1f98b275f4e2d8febb9e4478c5524.exe

  • Size

    758KB

  • MD5

    3aa1f98b275f4e2d8febb9e4478c5524

  • SHA1

    112cdacb64629da494eee7cac8b3a7b606e78bfe

  • SHA256

    07efd513a02e8c30296f7b73488d9a74796849787df14af028266cd79c89d51f

  • SHA512

    b7ca79b24281d0b94668ec8812a725f5c084efd9901c353aafd51d76055e708bc66302367c0b4ebb4546b4f314983bb6160a5ba507b4601513d19e8aa6b11130

Malware Config

Extracted

Family

cryptbot

C2

ewaisg12.top

morvay01.top

Attributes
  • payload_url

    http://winezo01.top/download.php?file=lv.exe

Signatures

  • CryptBot

    A C++ stealer distributed widely in bundle with other software.

  • CryptBot Payload 2 IoCs
  • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
  • Blocklisted process makes network request 5 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3aa1f98b275f4e2d8febb9e4478c5524.exe
    "C:\Users\Admin\AppData\Local\Temp\3aa1f98b275f4e2d8febb9e4478c5524.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3944
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\HgnjgZef.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2536
      • C:\Users\Admin\AppData\Local\Temp\HgnjgZef.exe
        "C:\Users\Admin\AppData\Local\Temp\HgnjgZef.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1920
        • C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe
          "C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"
          4⤵
          • Executes dropped EXE
          • Drops startup file
          • Suspicious use of WriteProcessMemory
          PID:2464
          • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
            "C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: AddClipboardFormatListener
            PID:3800
        • C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe
          "C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"
          4⤵
          • Executes dropped EXE
          • Checks processor information in registry
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:2112
          • C:\Users\Admin\AppData\Local\Temp\gqmjatrya.exe
            "C:\Users\Admin\AppData\Local\Temp\gqmjatrya.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:2188
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\GQMJAT~1.TMP,S C:\Users\Admin\AppData\Local\Temp\GQMJAT~1.EXE
              6⤵
              • Blocklisted process makes network request
              • Loads dropped DLL
              • Drops file in Program Files directory
              PID:1796
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\tvnniptsqqr.vbs"
            5⤵
              PID:1576
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\tgbchlavxlx.vbs"
              5⤵
              • Blocklisted process makes network request
              • Modifies system certificate store
              PID:660
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\qvauHlLDsqyi & timeout 3 & del /f /q "C:\Users\Admin\AppData\Local\Temp\3aa1f98b275f4e2d8febb9e4478c5524.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2008
        • C:\Windows\SysWOW64\timeout.exe
          timeout 3
          3⤵
          • Delays execution with timeout.exe
          PID:1972

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Install Root Certificate

    1
    T1130

    Modify Registry

    1
    T1112

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Collection

    Data from Local System

    2
    T1005

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\GQMJAT~1.TMP
      MD5

      808d3ad409144db9e8a6e645713690a4

      SHA1

      3632c2550c1163703cd179cc9ccdc6aa4dd73bce

      SHA256

      c9d0491f301ac2effbf939ab104c0d73942d86b03db34b96a1a85847e37b71e5

      SHA512

      2dda74f88d3065c9b7cf09e06d2be92d32042ad5e1abb001e54c72ddb7949530aaaaa24c45490517c121305c7f572c306dd3f0b9c0d2b2f888eba71931747e30

    • C:\Users\Admin\AppData\Local\Temp\HgnjgZef.exe
      MD5

      e1993ec02a47a879db8454c1e1f4cb6d

      SHA1

      489c76ef6ec40edfe2b9174ee20e4c225e5dd1c5

      SHA256

      c572a00f0d7fb2621a580d153985b9a00f322f11aaf83547f289b94ac497d020

      SHA512

      5472abbc488bda7311836920e1c73e27678f506d6a08b6455f1ccbacf0677b815b5c1cb1c7c2fc6fabdd30306e28e32d6d405d13f8c137d29d7641514f7bc872

    • C:\Users\Admin\AppData\Local\Temp\HgnjgZef.exe
      MD5

      e1993ec02a47a879db8454c1e1f4cb6d

      SHA1

      489c76ef6ec40edfe2b9174ee20e4c225e5dd1c5

      SHA256

      c572a00f0d7fb2621a580d153985b9a00f322f11aaf83547f289b94ac497d020

      SHA512

      5472abbc488bda7311836920e1c73e27678f506d6a08b6455f1ccbacf0677b815b5c1cb1c7c2fc6fabdd30306e28e32d6d405d13f8c137d29d7641514f7bc872

    • C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe
      MD5

      3c539776cf69aedac424e1f9c14494ad

      SHA1

      4d64404d18d7084628b86dac75bf8cfade34ae1d

      SHA256

      6fe38946bca0129a8b4bd412611c7b4a330b0b0d54c83e87293e52e83f9b007e

      SHA512

      9fe1015afb1a8ebf964d6016c534ff8433bdb8b0ee040f8483103cd056761e6bb2b9ca1246b916459df4249d1dfcf91f1b19b978725ce0eba66b4e8d65bdda67

    • C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe
      MD5

      3c539776cf69aedac424e1f9c14494ad

      SHA1

      4d64404d18d7084628b86dac75bf8cfade34ae1d

      SHA256

      6fe38946bca0129a8b4bd412611c7b4a330b0b0d54c83e87293e52e83f9b007e

      SHA512

      9fe1015afb1a8ebf964d6016c534ff8433bdb8b0ee040f8483103cd056761e6bb2b9ca1246b916459df4249d1dfcf91f1b19b978725ce0eba66b4e8d65bdda67

    • C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe
      MD5

      6d6b5c232059bdddbb75586f081fc1f8

      SHA1

      16a13d3dd9a924594306418a6cceddd2611588e5

      SHA256

      969a856e1206a3e8d27eccc9878e8c9207eb369885ffa46cff48506e86aaf4a0

      SHA512

      1510aff400990039bf199dd90e121b0bdc437a1337cf99b5a94b0473294d34dad9c136b3b908ad8888c07019623c7378f08e71f11c0f42a139b8f1aee73b1bb0

    • C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe
      MD5

      6d6b5c232059bdddbb75586f081fc1f8

      SHA1

      16a13d3dd9a924594306418a6cceddd2611588e5

      SHA256

      969a856e1206a3e8d27eccc9878e8c9207eb369885ffa46cff48506e86aaf4a0

      SHA512

      1510aff400990039bf199dd90e121b0bdc437a1337cf99b5a94b0473294d34dad9c136b3b908ad8888c07019623c7378f08e71f11c0f42a139b8f1aee73b1bb0

    • C:\Users\Admin\AppData\Local\Temp\gqmjatrya.exe
      MD5

      38b69ef4c1d553a9c41927b97d3401a6

      SHA1

      58e4e6e2db1d4870c8bd98015f6cdc84d3534dbd

      SHA256

      be391444eedc666fd587007fcf60f78120bfe056666b0784b6063a4e332aac97

      SHA512

      79d021e36175388e0e3031d5c95ab246b64a5844deb1a4342b241b68aad71f6ff7cb4a7a5bca2f8804afea78af7c56108f552176eaa08aa02584b79f827fb854

    • C:\Users\Admin\AppData\Local\Temp\gqmjatrya.exe
      MD5

      38b69ef4c1d553a9c41927b97d3401a6

      SHA1

      58e4e6e2db1d4870c8bd98015f6cdc84d3534dbd

      SHA256

      be391444eedc666fd587007fcf60f78120bfe056666b0784b6063a4e332aac97

      SHA512

      79d021e36175388e0e3031d5c95ab246b64a5844deb1a4342b241b68aad71f6ff7cb4a7a5bca2f8804afea78af7c56108f552176eaa08aa02584b79f827fb854

    • C:\Users\Admin\AppData\Local\Temp\qvauHlLDsqyi\CHFPTU~1.ZIP
      MD5

      2145d2f54a9b654dfc7b11c4297e0694

      SHA1

      10db66a41eba31eb25eaf0e44231d3814f84115f

      SHA256

      478043b3c34d08769ae82507410ffa245532cfea3dbd85da97b361b07463e225

      SHA512

      5738f0dc5c334cace1665c7335c78c4dcee18b2f759434af5337c0e486bd0f7d8bdfbafb87603c728abb04355f828e5f54baade9b3139666d6b32ae1485432eb

    • C:\Users\Admin\AppData\Local\Temp\qvauHlLDsqyi\DIYJLW~1.ZIP
      MD5

      54544ce93c97eac849a7d064bade0863

      SHA1

      4f235cd852ecd4007b547838e53f4bc50352235d

      SHA256

      703fe9e1fb919fcc0e2909a43730bf895902a4774596ca6f42f42b223a268a01

      SHA512

      6b2695b0cd007ee17bdd76c0d7d061263c67e3071cbe3f50624b9725d9b99a114a7f5a6eb40cd81aea33e698ccac5db36986c3ddd4a2537cd4f22a2b84bb60e4

    • C:\Users\Admin\AppData\Local\Temp\qvauHlLDsqyi\_Files\_INFOR~1.TXT
      MD5

      c2099c3aee677b74cd85284486520d52

      SHA1

      899e56be9b6f02ce1b3b7294096fcea256bd6181

      SHA256

      30c0308bdc16428fa1457d13be648e9e27c48d18da78d212f01a69375856e251

      SHA512

      cc35a3210551c6adabbf292ab63408a9c98d2e057858066f5d76c8f9aa5b50748ea29ed8bc6c176a6d27a4adcac630a0eb172508f8affb01185f35dcf1270034

    • C:\Users\Admin\AppData\Local\Temp\qvauHlLDsqyi\_Files\_SCREE~1.JPE
      MD5

      ddef8ccb2d731f22a668c9c3e284c756

      SHA1

      89fb7433d8d1c04823e5e7b5e2807b5c300c5479

      SHA256

      22fbf12519eeba4f43b9e81e1dd4518e4022f41aea8326ef078de3e009005568

      SHA512

      114309faac1b3fbe110e2cc66cbfa4fc26c6b2273f67cbace910045f4836d19b42afa8e9e66c0d407fcf3d638da2be619da7fdd2e93361ef63dc53e6386ea894

    • C:\Users\Admin\AppData\Local\Temp\qvauHlLDsqyi\files_\SCREEN~1.JPG
      MD5

      ddef8ccb2d731f22a668c9c3e284c756

      SHA1

      89fb7433d8d1c04823e5e7b5e2807b5c300c5479

      SHA256

      22fbf12519eeba4f43b9e81e1dd4518e4022f41aea8326ef078de3e009005568

      SHA512

      114309faac1b3fbe110e2cc66cbfa4fc26c6b2273f67cbace910045f4836d19b42afa8e9e66c0d407fcf3d638da2be619da7fdd2e93361ef63dc53e6386ea894

    • C:\Users\Admin\AppData\Local\Temp\qvauHlLDsqyi\files_\SYSTEM~1.TXT
      MD5

      338f653592709501ddbeed90b5948e1b

      SHA1

      7c76ae39d799d5cb677002719d2187eb79ebdeb7

      SHA256

      90e140d49f3d1e518f1b3a4066c6457c7831bca6e9a4f660bb0f702517686a0a

      SHA512

      da388e0d72d046d074d2715f157fc83721f2b113535782d8065e033029a2f2cc8fc3808d2c654adc2df11739847957aa33521ec9e8bbfb94ff49cdd4a59d2a27

    • C:\Users\Admin\AppData\Local\Temp\tgbchlavxlx.vbs
      MD5

      574ae07c03025de981a0d0b5a16171ff

      SHA1

      5f9e1c456b5e425b50db343d3064081f132e4d49

      SHA256

      3f8b82d6f332f845308bda2192b584d3dd0c640364a18f2a9bba1da76cedc089

      SHA512

      8ad6f6e48eff220f9548a2df173a117e254667db69b4eaa5efdf6ef91e52b7d6d8690ebc1adc01cfb85cc7061300336b4f6ca23469b8296dbe96a583d99c636c

    • C:\Users\Admin\AppData\Local\Temp\tvnniptsqqr.vbs
      MD5

      57d4a71d02879215210bd4602029d1cd

      SHA1

      0e9bb708edd0652c576c3e19a76dc5cfaab07d0e

      SHA256

      e33dc24d7b402feaeb8ef94e2bc2ff7e5bfb670090fc0140b8a7a559ac4e986e

      SHA512

      f4215e7fd2b0b712f4c3c20472352619a15ab624561cb1eefdc00c047d919dd54ae3723abb4820158e03ce5dd9428069a1899980bda705867f14e4881812e6e2

    • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
      MD5

      3c539776cf69aedac424e1f9c14494ad

      SHA1

      4d64404d18d7084628b86dac75bf8cfade34ae1d

      SHA256

      6fe38946bca0129a8b4bd412611c7b4a330b0b0d54c83e87293e52e83f9b007e

      SHA512

      9fe1015afb1a8ebf964d6016c534ff8433bdb8b0ee040f8483103cd056761e6bb2b9ca1246b916459df4249d1dfcf91f1b19b978725ce0eba66b4e8d65bdda67

    • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
      MD5

      3c539776cf69aedac424e1f9c14494ad

      SHA1

      4d64404d18d7084628b86dac75bf8cfade34ae1d

      SHA256

      6fe38946bca0129a8b4bd412611c7b4a330b0b0d54c83e87293e52e83f9b007e

      SHA512

      9fe1015afb1a8ebf964d6016c534ff8433bdb8b0ee040f8483103cd056761e6bb2b9ca1246b916459df4249d1dfcf91f1b19b978725ce0eba66b4e8d65bdda67

    • \Users\Admin\AppData\Local\Temp\GQMJAT~1.TMP
      MD5

      808d3ad409144db9e8a6e645713690a4

      SHA1

      3632c2550c1163703cd179cc9ccdc6aa4dd73bce

      SHA256

      c9d0491f301ac2effbf939ab104c0d73942d86b03db34b96a1a85847e37b71e5

      SHA512

      2dda74f88d3065c9b7cf09e06d2be92d32042ad5e1abb001e54c72ddb7949530aaaaa24c45490517c121305c7f572c306dd3f0b9c0d2b2f888eba71931747e30

    • \Users\Admin\AppData\Local\Temp\GQMJAT~1.TMP
      MD5

      808d3ad409144db9e8a6e645713690a4

      SHA1

      3632c2550c1163703cd179cc9ccdc6aa4dd73bce

      SHA256

      c9d0491f301ac2effbf939ab104c0d73942d86b03db34b96a1a85847e37b71e5

      SHA512

      2dda74f88d3065c9b7cf09e06d2be92d32042ad5e1abb001e54c72ddb7949530aaaaa24c45490517c121305c7f572c306dd3f0b9c0d2b2f888eba71931747e30

    • \Users\Admin\AppData\Local\Temp\nsk3A31.tmp\UAC.dll
      MD5

      adb29e6b186daa765dc750128649b63d

      SHA1

      160cbdc4cb0ac2c142d361df138c537aa7e708c9

      SHA256

      2f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08

      SHA512

      b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada

    • memory/660-156-0x0000000000000000-mapping.dmp
    • memory/1576-147-0x0000000000000000-mapping.dmp
    • memory/1796-155-0x0000000004430000-0x000000000458F000-memory.dmp
      Filesize

      1.4MB

    • memory/1796-149-0x0000000000000000-mapping.dmp
    • memory/1920-117-0x0000000000000000-mapping.dmp
    • memory/1972-134-0x0000000000000000-mapping.dmp
    • memory/2008-127-0x0000000000000000-mapping.dmp
    • memory/2112-141-0x0000000000400000-0x0000000000472000-memory.dmp
      Filesize

      456KB

    • memory/2112-140-0x0000000000600000-0x0000000000624000-memory.dmp
      Filesize

      144KB

    • memory/2112-123-0x0000000000000000-mapping.dmp
    • memory/2188-142-0x0000000000000000-mapping.dmp
    • memory/2188-151-0x0000000000400000-0x0000000000548000-memory.dmp
      Filesize

      1.3MB

    • memory/2188-150-0x0000000002390000-0x0000000002490000-memory.dmp
      Filesize

      1024KB

    • memory/2464-139-0x0000000000400000-0x0000000000472000-memory.dmp
      Filesize

      456KB

    • memory/2464-121-0x0000000000000000-mapping.dmp
    • memory/2464-138-0x0000000001F50000-0x0000000001F76000-memory.dmp
      Filesize

      152KB

    • memory/2536-116-0x0000000000000000-mapping.dmp
    • memory/3800-145-0x00000000005C0000-0x000000000070A000-memory.dmp
      Filesize

      1.3MB

    • memory/3800-146-0x0000000000400000-0x0000000000472000-memory.dmp
      Filesize

      456KB

    • memory/3800-135-0x0000000000000000-mapping.dmp
    • memory/3944-115-0x0000000000400000-0x00000000004E5000-memory.dmp
      Filesize

      916KB

    • memory/3944-114-0x0000000002180000-0x0000000002261000-memory.dmp
      Filesize

      900KB