Analysis

  • max time kernel
    103s
  • max time network
    147s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    27-07-2021 16:06

General

  • Target

    3aa1f98b275f4e2d8febb9e4478c5524.exe

  • Size

    758KB

  • MD5

    3aa1f98b275f4e2d8febb9e4478c5524

  • SHA1

    112cdacb64629da494eee7cac8b3a7b606e78bfe

  • SHA256

    07efd513a02e8c30296f7b73488d9a74796849787df14af028266cd79c89d51f

  • SHA512

    b7ca79b24281d0b94668ec8812a725f5c084efd9901c353aafd51d76055e708bc66302367c0b4ebb4546b4f314983bb6160a5ba507b4601513d19e8aa6b11130

Malware Config

Extracted

Family

cryptbot

C2

ewaisg12.top

morvay01.top

Attributes
  • payload_url

    http://winezo01.top/download.php?file=lv.exe

Signatures

  • CryptBot

    A C++ stealer distributed widely in bundle with other software.

  • CryptBot Payload 2 IoCs
  • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
  • Blocklisted process makes network request 5 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3aa1f98b275f4e2d8febb9e4478c5524.exe
    "C:\Users\Admin\AppData\Local\Temp\3aa1f98b275f4e2d8febb9e4478c5524.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1096
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\cKTBdb.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1196
      • C:\Users\Admin\AppData\Local\Temp\cKTBdb.exe
        "C:\Users\Admin\AppData\Local\Temp\cKTBdb.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:3600
        • C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe
          "C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"
          4⤵
          • Executes dropped EXE
          • Drops startup file
          • Suspicious use of WriteProcessMemory
          PID:2112
          • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
            "C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: AddClipboardFormatListener
            PID:2304
        • C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe
          "C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"
          4⤵
          • Executes dropped EXE
          • Checks processor information in registry
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:492
          • C:\Users\Admin\AppData\Local\Temp\nsawckkurvpr.exe
            "C:\Users\Admin\AppData\Local\Temp\nsawckkurvpr.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:696
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\NSAWCK~1.TMP,S C:\Users\Admin\AppData\Local\Temp\NSAWCK~1.EXE
              6⤵
              • Blocklisted process makes network request
              • Loads dropped DLL
              • Drops file in Program Files directory
              PID:2608
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\xqcuoqqhg.vbs"
            5⤵
              PID:904
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\egehaaostsy.vbs"
              5⤵
              • Blocklisted process makes network request
              • Modifies system certificate store
              PID:472
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\cEMWbnXwEcd & timeout 3 & del /f /q "C:\Users\Admin\AppData\Local\Temp\3aa1f98b275f4e2d8febb9e4478c5524.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3952
        • C:\Windows\SysWOW64\timeout.exe
          timeout 3
          3⤵
          • Delays execution with timeout.exe
          PID:2704

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Install Root Certificate

    1
    T1130

    Modify Registry

    1
    T1112

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Collection

    Data from Local System

    2
    T1005

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\NSAWCK~1.TMP
      MD5

      808d3ad409144db9e8a6e645713690a4

      SHA1

      3632c2550c1163703cd179cc9ccdc6aa4dd73bce

      SHA256

      c9d0491f301ac2effbf939ab104c0d73942d86b03db34b96a1a85847e37b71e5

      SHA512

      2dda74f88d3065c9b7cf09e06d2be92d32042ad5e1abb001e54c72ddb7949530aaaaa24c45490517c121305c7f572c306dd3f0b9c0d2b2f888eba71931747e30

    • C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe
      MD5

      3c539776cf69aedac424e1f9c14494ad

      SHA1

      4d64404d18d7084628b86dac75bf8cfade34ae1d

      SHA256

      6fe38946bca0129a8b4bd412611c7b4a330b0b0d54c83e87293e52e83f9b007e

      SHA512

      9fe1015afb1a8ebf964d6016c534ff8433bdb8b0ee040f8483103cd056761e6bb2b9ca1246b916459df4249d1dfcf91f1b19b978725ce0eba66b4e8d65bdda67

    • C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe
      MD5

      3c539776cf69aedac424e1f9c14494ad

      SHA1

      4d64404d18d7084628b86dac75bf8cfade34ae1d

      SHA256

      6fe38946bca0129a8b4bd412611c7b4a330b0b0d54c83e87293e52e83f9b007e

      SHA512

      9fe1015afb1a8ebf964d6016c534ff8433bdb8b0ee040f8483103cd056761e6bb2b9ca1246b916459df4249d1dfcf91f1b19b978725ce0eba66b4e8d65bdda67

    • C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe
      MD5

      6d6b5c232059bdddbb75586f081fc1f8

      SHA1

      16a13d3dd9a924594306418a6cceddd2611588e5

      SHA256

      969a856e1206a3e8d27eccc9878e8c9207eb369885ffa46cff48506e86aaf4a0

      SHA512

      1510aff400990039bf199dd90e121b0bdc437a1337cf99b5a94b0473294d34dad9c136b3b908ad8888c07019623c7378f08e71f11c0f42a139b8f1aee73b1bb0

    • C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe
      MD5

      6d6b5c232059bdddbb75586f081fc1f8

      SHA1

      16a13d3dd9a924594306418a6cceddd2611588e5

      SHA256

      969a856e1206a3e8d27eccc9878e8c9207eb369885ffa46cff48506e86aaf4a0

      SHA512

      1510aff400990039bf199dd90e121b0bdc437a1337cf99b5a94b0473294d34dad9c136b3b908ad8888c07019623c7378f08e71f11c0f42a139b8f1aee73b1bb0

    • C:\Users\Admin\AppData\Local\Temp\cEMWbnXwEcd\GGHHAV~1.ZIP
      MD5

      8aa17a22e4dc0fdeb7446cda5f1ead10

      SHA1

      1f8cc6469ed8e15465ef19eaed79e3f25c9940e4

      SHA256

      2d28ebcf7ccf84ff84e0816eee27236eb1b712ad801b8c02c07cf1667d37369a

      SHA512

      a35efd3735ed179df896773cce55dc0e34672c689a3d9ff59a1379667301ed5e31bc4f8ca6664c24ca20eeb04751e9ed67c589bec4f2c3e8cf2ee571f87fc579

    • C:\Users\Admin\AppData\Local\Temp\cEMWbnXwEcd\VNYMRC~1.ZIP
      MD5

      bc90eac048efc0ad8c84f9e6dad204c5

      SHA1

      0b1668aad9917515cf28a2f13cc548d8f16e33ec

      SHA256

      c5d854a338f251d998a22ecfe1b802baebc21681e0ff66dc2d03d3e1adc1ce6c

      SHA512

      671e953555660543488f5aaca4c54086f1d294b5fa67045c70f25da5db1800437cc3031f0f25c1a81e32fd5c86fa63b49664207813cca7ab8eed630cdaf9a2a8

    • C:\Users\Admin\AppData\Local\Temp\cEMWbnXwEcd\_Files\_INFOR~1.TXT
      MD5

      8a287a47a4a9f31a5bf7a95d2c0e8f70

      SHA1

      8045c19b3932759d5c0e5622143cc6aa05f06641

      SHA256

      cd4ca9110fb518d7dab81d30aa8bf24f68ab482633c67ba76430ad295e01c094

      SHA512

      cb44b97acf28d7dcee4cdbe5eaf259e7a9eda3c2a5260189cc29abb36d162f710cb919c4d57cd7f7528779f2d46e5186c05fc3cd21e288cb3ae81c1a253a927b

    • C:\Users\Admin\AppData\Local\Temp\cEMWbnXwEcd\_Files\_SCREE~1.JPE
      MD5

      b49cd3c62f14fb6864fb7f90f99875bb

      SHA1

      e5ce0245f35182b660835cac9ef65fd8acb65099

      SHA256

      e7830fcb506623faf9b13494dadb9077ed8f65b434413482d1de57ce31463e87

      SHA512

      94fb3f20c0c537096ddedaea5b7e5a1af9d88a86d8cf23628bbc9401de5b5780d75f22d216674f730a9bcc3500db6e24f6b69df56a64fe6e05a28510807c38a9

    • C:\Users\Admin\AppData\Local\Temp\cEMWbnXwEcd\files_\SCREEN~1.JPG
      MD5

      b49cd3c62f14fb6864fb7f90f99875bb

      SHA1

      e5ce0245f35182b660835cac9ef65fd8acb65099

      SHA256

      e7830fcb506623faf9b13494dadb9077ed8f65b434413482d1de57ce31463e87

      SHA512

      94fb3f20c0c537096ddedaea5b7e5a1af9d88a86d8cf23628bbc9401de5b5780d75f22d216674f730a9bcc3500db6e24f6b69df56a64fe6e05a28510807c38a9

    • C:\Users\Admin\AppData\Local\Temp\cEMWbnXwEcd\files_\SYSTEM~1.TXT
      MD5

      a1a6477dd8c96285472a3c6853df928d

      SHA1

      e3bcb71de0c77a2977e745203c6140238ea74104

      SHA256

      d168d2e92e1c172c5f019239833f305a65761de1244457022a313b975dad3fc0

      SHA512

      63092500cba83879a5e727106fd37aff5d050270ce8299d99e239fdd4949b01d61209dcc92b348d76ba8fc5e0c4f0ca3ed855deb84fe844bf5bca7bbe6fdb631

    • C:\Users\Admin\AppData\Local\Temp\cKTBdb.exe
      MD5

      e1993ec02a47a879db8454c1e1f4cb6d

      SHA1

      489c76ef6ec40edfe2b9174ee20e4c225e5dd1c5

      SHA256

      c572a00f0d7fb2621a580d153985b9a00f322f11aaf83547f289b94ac497d020

      SHA512

      5472abbc488bda7311836920e1c73e27678f506d6a08b6455f1ccbacf0677b815b5c1cb1c7c2fc6fabdd30306e28e32d6d405d13f8c137d29d7641514f7bc872

    • C:\Users\Admin\AppData\Local\Temp\cKTBdb.exe
      MD5

      e1993ec02a47a879db8454c1e1f4cb6d

      SHA1

      489c76ef6ec40edfe2b9174ee20e4c225e5dd1c5

      SHA256

      c572a00f0d7fb2621a580d153985b9a00f322f11aaf83547f289b94ac497d020

      SHA512

      5472abbc488bda7311836920e1c73e27678f506d6a08b6455f1ccbacf0677b815b5c1cb1c7c2fc6fabdd30306e28e32d6d405d13f8c137d29d7641514f7bc872

    • C:\Users\Admin\AppData\Local\Temp\egehaaostsy.vbs
      MD5

      ed4b2ba170429634a3cd5430fe6ea47d

      SHA1

      db1f2fec9ccd8c5c9f541d5d12d694f09d6be51e

      SHA256

      7f40d5c87af72ee28f0408f3c2a7ebc0bfcce7f6425a34127a55a7c7705f8717

      SHA512

      95a556472028ba56ee0ca331679dc6116549d41319c41eb1744c5859c9708931d5fd09bcd68d98265e3a68fd5647ab5569d4fe7450a826c4ab2b11343afa5ddf

    • C:\Users\Admin\AppData\Local\Temp\nsawckkurvpr.exe
      MD5

      38b69ef4c1d553a9c41927b97d3401a6

      SHA1

      58e4e6e2db1d4870c8bd98015f6cdc84d3534dbd

      SHA256

      be391444eedc666fd587007fcf60f78120bfe056666b0784b6063a4e332aac97

      SHA512

      79d021e36175388e0e3031d5c95ab246b64a5844deb1a4342b241b68aad71f6ff7cb4a7a5bca2f8804afea78af7c56108f552176eaa08aa02584b79f827fb854

    • C:\Users\Admin\AppData\Local\Temp\nsawckkurvpr.exe
      MD5

      38b69ef4c1d553a9c41927b97d3401a6

      SHA1

      58e4e6e2db1d4870c8bd98015f6cdc84d3534dbd

      SHA256

      be391444eedc666fd587007fcf60f78120bfe056666b0784b6063a4e332aac97

      SHA512

      79d021e36175388e0e3031d5c95ab246b64a5844deb1a4342b241b68aad71f6ff7cb4a7a5bca2f8804afea78af7c56108f552176eaa08aa02584b79f827fb854

    • C:\Users\Admin\AppData\Local\Temp\xqcuoqqhg.vbs
      MD5

      9b17b995cfef7c39c16d5c270dc46985

      SHA1

      08a190346d17eeb89b3ca9d142e04ec090c2df54

      SHA256

      e4c541fca0d1e8f5f6279ddb2eaaedd311d48ff15fcb913ce7b4201222ff90dc

      SHA512

      3291bc4e803f41d7a81cb95376cca1baf24e0d2070d539883ef67a70a8fe7b38bc6d1635a7f170b4c31dc032c110285a1db0dad0e0abea9d21dc4aebf93a78fb

    • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
      MD5

      3c539776cf69aedac424e1f9c14494ad

      SHA1

      4d64404d18d7084628b86dac75bf8cfade34ae1d

      SHA256

      6fe38946bca0129a8b4bd412611c7b4a330b0b0d54c83e87293e52e83f9b007e

      SHA512

      9fe1015afb1a8ebf964d6016c534ff8433bdb8b0ee040f8483103cd056761e6bb2b9ca1246b916459df4249d1dfcf91f1b19b978725ce0eba66b4e8d65bdda67

    • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
      MD5

      3c539776cf69aedac424e1f9c14494ad

      SHA1

      4d64404d18d7084628b86dac75bf8cfade34ae1d

      SHA256

      6fe38946bca0129a8b4bd412611c7b4a330b0b0d54c83e87293e52e83f9b007e

      SHA512

      9fe1015afb1a8ebf964d6016c534ff8433bdb8b0ee040f8483103cd056761e6bb2b9ca1246b916459df4249d1dfcf91f1b19b978725ce0eba66b4e8d65bdda67

    • \Users\Admin\AppData\Local\Temp\NSAWCK~1.TMP
      MD5

      808d3ad409144db9e8a6e645713690a4

      SHA1

      3632c2550c1163703cd179cc9ccdc6aa4dd73bce

      SHA256

      c9d0491f301ac2effbf939ab104c0d73942d86b03db34b96a1a85847e37b71e5

      SHA512

      2dda74f88d3065c9b7cf09e06d2be92d32042ad5e1abb001e54c72ddb7949530aaaaa24c45490517c121305c7f572c306dd3f0b9c0d2b2f888eba71931747e30

    • \Users\Admin\AppData\Local\Temp\nsj9D50.tmp\UAC.dll
      MD5

      adb29e6b186daa765dc750128649b63d

      SHA1

      160cbdc4cb0ac2c142d361df138c537aa7e708c9

      SHA256

      2f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08

      SHA512

      b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada

    • memory/472-154-0x0000000000000000-mapping.dmp
    • memory/492-138-0x0000000000480000-0x000000000052E000-memory.dmp
      Filesize

      696KB

    • memory/492-140-0x0000000000400000-0x0000000000472000-memory.dmp
      Filesize

      456KB

    • memory/492-124-0x0000000000000000-mapping.dmp
    • memory/696-152-0x0000000002290000-0x0000000002390000-memory.dmp
      Filesize

      1024KB

    • memory/696-153-0x0000000000400000-0x0000000000548000-memory.dmp
      Filesize

      1.3MB

    • memory/696-142-0x0000000000000000-mapping.dmp
    • memory/904-145-0x0000000000000000-mapping.dmp
    • memory/1096-115-0x0000000000400000-0x00000000004E5000-memory.dmp
      Filesize

      916KB

    • memory/1096-114-0x0000000002220000-0x0000000002301000-memory.dmp
      Filesize

      900KB

    • memory/1196-116-0x0000000000000000-mapping.dmp
    • memory/2112-141-0x0000000000400000-0x0000000000472000-memory.dmp
      Filesize

      456KB

    • memory/2112-139-0x0000000000570000-0x00000000006BA000-memory.dmp
      Filesize

      1.3MB

    • memory/2112-121-0x0000000000000000-mapping.dmp
    • memory/2304-148-0x0000000000400000-0x0000000000472000-memory.dmp
      Filesize

      456KB

    • memory/2304-147-0x0000000000490000-0x00000000004B6000-memory.dmp
      Filesize

      152KB

    • memory/2304-135-0x0000000000000000-mapping.dmp
    • memory/2608-149-0x0000000000000000-mapping.dmp
    • memory/2704-134-0x0000000000000000-mapping.dmp
    • memory/3600-117-0x0000000000000000-mapping.dmp
    • memory/3952-127-0x0000000000000000-mapping.dmp