Analysis

  • max time kernel
    104s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    27-07-2021 15:48

General

  • Target

    af12a5b1fb40fb31e4f8979b0a4cb42c.exe

  • Size

    758KB

  • MD5

    af12a5b1fb40fb31e4f8979b0a4cb42c

  • SHA1

    a1ff752ec748ca0dae13b861b8bbc3da61fc7c8c

  • SHA256

    a4c1611cb53460b6e745cc05101f83a834d66d78462fff9b190cff9727784700

  • SHA512

    a2107fd5547b7040ee2e584c83fc24ec6dba39d87934f18caf1161a5cfda817296758b6145452800f0ecbb23831e9b8a29f9328f22dda8eecb2f1b958880a6d1

Malware Config

Extracted

Family

cryptbot

C2

ewaisg12.top

morvay01.top

Attributes
  • payload_url

    http://winezo01.top/download.php?file=lv.exe

Signatures

  • CryptBot

    A C++ stealer distributed widely in bundle with other software.

  • CryptBot Payload 2 IoCs
  • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
  • Blocklisted process makes network request 5 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af12a5b1fb40fb31e4f8979b0a4cb42c.exe
    "C:\Users\Admin\AppData\Local\Temp\af12a5b1fb40fb31e4f8979b0a4cb42c.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:628
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\XjZUBOT.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1780
      • C:\Users\Admin\AppData\Local\Temp\XjZUBOT.exe
        "C:\Users\Admin\AppData\Local\Temp\XjZUBOT.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        PID:1500
        • C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe
          "C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe"
          4⤵
          • Executes dropped EXE
          • Drops startup file
          • Suspicious use of WriteProcessMemory
          PID:3920
          • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
            "C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: AddClipboardFormatListener
            PID:4012
        • C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe
          "C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe"
          4⤵
          • Executes dropped EXE
          • Checks processor information in registry
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:1540
          • C:\Users\Admin\AppData\Local\Temp\mnjowjlwjovv.exe
            "C:\Users\Admin\AppData\Local\Temp\mnjowjlwjovv.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of WriteProcessMemory
            PID:3964
            • C:\Windows\SysWOW64\rundll32.exe
              C:\Windows\system32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\MNJOWJ~1.TMP,S C:\Users\Admin\AppData\Local\Temp\MNJOWJ~1.EXE
              6⤵
              • Blocklisted process makes network request
              • Loads dropped DLL
              • Drops file in Program Files directory
              PID:876
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\axllkofcqi.vbs"
            5⤵
              PID:3416
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\dbbqnvgqu.vbs"
              5⤵
              • Blocklisted process makes network request
              • Modifies system certificate store
              PID:3008
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\Olchtuhu & timeout 3 & del /f /q "C:\Users\Admin\AppData\Local\Temp\af12a5b1fb40fb31e4f8979b0a4cb42c.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2156
        • C:\Windows\SysWOW64\timeout.exe
          timeout 3
          3⤵
          • Delays execution with timeout.exe
          PID:3908

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Install Root Certificate

    1
    T1130

    Modify Registry

    1
    T1112

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Collection

    Data from Local System

    2
    T1005

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\MNJOWJ~1.TMP
      MD5

      808d3ad409144db9e8a6e645713690a4

      SHA1

      3632c2550c1163703cd179cc9ccdc6aa4dd73bce

      SHA256

      c9d0491f301ac2effbf939ab104c0d73942d86b03db34b96a1a85847e37b71e5

      SHA512

      2dda74f88d3065c9b7cf09e06d2be92d32042ad5e1abb001e54c72ddb7949530aaaaa24c45490517c121305c7f572c306dd3f0b9c0d2b2f888eba71931747e30

    • C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe
      MD5

      3c539776cf69aedac424e1f9c14494ad

      SHA1

      4d64404d18d7084628b86dac75bf8cfade34ae1d

      SHA256

      6fe38946bca0129a8b4bd412611c7b4a330b0b0d54c83e87293e52e83f9b007e

      SHA512

      9fe1015afb1a8ebf964d6016c534ff8433bdb8b0ee040f8483103cd056761e6bb2b9ca1246b916459df4249d1dfcf91f1b19b978725ce0eba66b4e8d65bdda67

    • C:\Users\Admin\AppData\Local\Temp\New Feature\4.exe
      MD5

      3c539776cf69aedac424e1f9c14494ad

      SHA1

      4d64404d18d7084628b86dac75bf8cfade34ae1d

      SHA256

      6fe38946bca0129a8b4bd412611c7b4a330b0b0d54c83e87293e52e83f9b007e

      SHA512

      9fe1015afb1a8ebf964d6016c534ff8433bdb8b0ee040f8483103cd056761e6bb2b9ca1246b916459df4249d1dfcf91f1b19b978725ce0eba66b4e8d65bdda67

    • C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe
      MD5

      6d6b5c232059bdddbb75586f081fc1f8

      SHA1

      16a13d3dd9a924594306418a6cceddd2611588e5

      SHA256

      969a856e1206a3e8d27eccc9878e8c9207eb369885ffa46cff48506e86aaf4a0

      SHA512

      1510aff400990039bf199dd90e121b0bdc437a1337cf99b5a94b0473294d34dad9c136b3b908ad8888c07019623c7378f08e71f11c0f42a139b8f1aee73b1bb0

    • C:\Users\Admin\AppData\Local\Temp\New Feature\vpn.exe
      MD5

      6d6b5c232059bdddbb75586f081fc1f8

      SHA1

      16a13d3dd9a924594306418a6cceddd2611588e5

      SHA256

      969a856e1206a3e8d27eccc9878e8c9207eb369885ffa46cff48506e86aaf4a0

      SHA512

      1510aff400990039bf199dd90e121b0bdc437a1337cf99b5a94b0473294d34dad9c136b3b908ad8888c07019623c7378f08e71f11c0f42a139b8f1aee73b1bb0

    • C:\Users\Admin\AppData\Local\Temp\Olchtuhu\SUALLH~1.ZIP
      MD5

      7939123ef1f0671ad9b8f8fefbbfc24d

      SHA1

      b562cd6b8425e561880dcd70acfe36b8842b8a42

      SHA256

      3b604c68686ccbf83e3bffb0ba740fc0571dda1701bf877e8719aa4ef7534420

      SHA512

      52c352fac3eb72b59fb802ae7f280b634d8c01820a880905ee1722a77fd96471d8ddeb3674c70f0d59aa906b12f51c5958d55ac0b2859a9532fc153c45ee21bc

    • C:\Users\Admin\AppData\Local\Temp\Olchtuhu\UudIsrWg.zip
      MD5

      0cb64279c25a0033c653b7d49a6d344d

      SHA1

      8a857b42c6ded3fb72bb6b20a76a80876f0a322a

      SHA256

      edf3ecbaf4314fe598816820bbe6cb7b5a8f365fe51068ff7bdc83444998aae0

      SHA512

      2123d48cb41dc61b9b2beeb9ec4a196e109d81f78b6ebb04520dc13ee22d5a01ae01f8829b57c93308b8cb713bb21546b7c092925d3da30f2844590a5c592537

    • C:\Users\Admin\AppData\Local\Temp\Olchtuhu\_Files\_Files\CONVER~1.TXT
      MD5

      ca6e507a4a951712d783b4864b00d277

      SHA1

      4091ae88380cfdd671dcd67d2ec0a2ce7ea371d8

      SHA256

      2a5c252dde686d54614126b3f99c58e744f572977292fa9a6b389ac6c0491b0a

      SHA512

      711511be8c153d56bbd4310225673d718d15ec2dbc534e11474864dde53d754af3d2fb4c79e3c129a86addd8d9160c527a30bc0d5fc8ec71a221e178dfd7c28f

    • C:\Users\Admin\AppData\Local\Temp\Olchtuhu\_Files\_Files\REDOPU~1.TXT
      MD5

      9996b96af2310b2f2ae7144a3c37869a

      SHA1

      82bd006689f28582209491aba728a169ff509827

      SHA256

      07bafc2350dad4b481eb1dee03154afee94c91fbc40bb2e94dd9d84bc801d18e

      SHA512

      570625acc5b50c049db0bb0c39c9536c86a94f904925d90a028d2c50a85b9bf2f7e3a8c40f2517bbf155583976676b6e254832f16c33f22f539ffb8ceff3c019

    • C:\Users\Admin\AppData\Local\Temp\Olchtuhu\_Files\_INFOR~1.TXT
      MD5

      19de900cad00113d575a4ba7c7f7c12f

      SHA1

      5df33b2f0b03c3f564f9ad32c18396e531acd709

      SHA256

      98c75eaa086ae2c83250e8a629ac95bb0a5c3c3a89fb44a9fc97567c1b625230

      SHA512

      5c18dd412aa4ab39d65edaece053daee75c612cb49ce92f91d9680611f3fe8a6fff67f0af50d0a05c5ee89637291b952805e42fcac143b931ffd35ffe513d4a8

    • C:\Users\Admin\AppData\Local\Temp\Olchtuhu\_Files\_SCREE~1.JPE
      MD5

      dc8f4abfa1a1c39f97aef70549ab9e43

      SHA1

      a7702f6afdc89e3c89f1d0bb51fcf63d4ce574c2

      SHA256

      b3ffd04c5d1ce01b676166dd1dba2b9b82d1d952b91a98eee2e53969e02f770c

      SHA512

      e2929d5622eac418ff953c4ddde836f6af604ad1a431ef7c171353995041487603ed48d5c597ff97bf9d5c886bc6d70f84229d4a16ba06daf3bb008312c054ab

    • C:\Users\Admin\AppData\Local\Temp\Olchtuhu\files_\SCREEN~1.JPG
      MD5

      dc8f4abfa1a1c39f97aef70549ab9e43

      SHA1

      a7702f6afdc89e3c89f1d0bb51fcf63d4ce574c2

      SHA256

      b3ffd04c5d1ce01b676166dd1dba2b9b82d1d952b91a98eee2e53969e02f770c

      SHA512

      e2929d5622eac418ff953c4ddde836f6af604ad1a431ef7c171353995041487603ed48d5c597ff97bf9d5c886bc6d70f84229d4a16ba06daf3bb008312c054ab

    • C:\Users\Admin\AppData\Local\Temp\Olchtuhu\files_\SYSTEM~1.TXT
      MD5

      ae755f6239be177a846bdda5427876b1

      SHA1

      03a714d0229ec105baf8268e90d698b2a0b02e2a

      SHA256

      53e4bd2b31c7db8857aac25fbc3c662d4f47b70cc72a475c6fde6c5944f5a312

      SHA512

      84cf45dabf67e3f68edf104a2aaf8182bac50b4c3f077cb31d8247ec2178f2c35f89670927bf9d5cec0a8b4eb95a5d200700f8d6ebe51184417245237495edd5

    • C:\Users\Admin\AppData\Local\Temp\Olchtuhu\files_\files\CONVER~1.TXT
      MD5

      ca6e507a4a951712d783b4864b00d277

      SHA1

      4091ae88380cfdd671dcd67d2ec0a2ce7ea371d8

      SHA256

      2a5c252dde686d54614126b3f99c58e744f572977292fa9a6b389ac6c0491b0a

      SHA512

      711511be8c153d56bbd4310225673d718d15ec2dbc534e11474864dde53d754af3d2fb4c79e3c129a86addd8d9160c527a30bc0d5fc8ec71a221e178dfd7c28f

    • C:\Users\Admin\AppData\Local\Temp\Olchtuhu\files_\files\REDOPU~1.TXT
      MD5

      9996b96af2310b2f2ae7144a3c37869a

      SHA1

      82bd006689f28582209491aba728a169ff509827

      SHA256

      07bafc2350dad4b481eb1dee03154afee94c91fbc40bb2e94dd9d84bc801d18e

      SHA512

      570625acc5b50c049db0bb0c39c9536c86a94f904925d90a028d2c50a85b9bf2f7e3a8c40f2517bbf155583976676b6e254832f16c33f22f539ffb8ceff3c019

    • C:\Users\Admin\AppData\Local\Temp\XjZUBOT.exe
      MD5

      e1993ec02a47a879db8454c1e1f4cb6d

      SHA1

      489c76ef6ec40edfe2b9174ee20e4c225e5dd1c5

      SHA256

      c572a00f0d7fb2621a580d153985b9a00f322f11aaf83547f289b94ac497d020

      SHA512

      5472abbc488bda7311836920e1c73e27678f506d6a08b6455f1ccbacf0677b815b5c1cb1c7c2fc6fabdd30306e28e32d6d405d13f8c137d29d7641514f7bc872

    • C:\Users\Admin\AppData\Local\Temp\XjZUBOT.exe
      MD5

      e1993ec02a47a879db8454c1e1f4cb6d

      SHA1

      489c76ef6ec40edfe2b9174ee20e4c225e5dd1c5

      SHA256

      c572a00f0d7fb2621a580d153985b9a00f322f11aaf83547f289b94ac497d020

      SHA512

      5472abbc488bda7311836920e1c73e27678f506d6a08b6455f1ccbacf0677b815b5c1cb1c7c2fc6fabdd30306e28e32d6d405d13f8c137d29d7641514f7bc872

    • C:\Users\Admin\AppData\Local\Temp\axllkofcqi.vbs
      MD5

      2193da7f6146d399a8fc69f8161ff595

      SHA1

      749185ea076f8ccdf34fc0757d30999e50b98ed8

      SHA256

      6624ae38567f1c26a34c53398531cacbd0f89a1feb0ceb148bada91ce12426ed

      SHA512

      7e72090364e34535f72dedcedc03366d82bab4febd170a6efc798138dbcee39f64d0d5390c05384926296cbd1acb87ad0955cae7153745da26ea712c6abdb64b

    • C:\Users\Admin\AppData\Local\Temp\dbbqnvgqu.vbs
      MD5

      e63d2a3d5b6d0cbb77289837263c79c5

      SHA1

      36cdae68c3e2a011887e45a0a1e774cd74661bd7

      SHA256

      89468d328b49d1abc2f9086d1471f6b8dc2957bf06c4826abe7b0dc8fb4a6dbb

      SHA512

      c69f3b8f7a005f8440499336b685e00166129405db8259a46057b0a0ebad2f55186b6bbee1f8b70ec36b9b90efaf788616f3a7447021aacdad850a71ecac4df4

    • C:\Users\Admin\AppData\Local\Temp\mnjowjlwjovv.exe
      MD5

      38b69ef4c1d553a9c41927b97d3401a6

      SHA1

      58e4e6e2db1d4870c8bd98015f6cdc84d3534dbd

      SHA256

      be391444eedc666fd587007fcf60f78120bfe056666b0784b6063a4e332aac97

      SHA512

      79d021e36175388e0e3031d5c95ab246b64a5844deb1a4342b241b68aad71f6ff7cb4a7a5bca2f8804afea78af7c56108f552176eaa08aa02584b79f827fb854

    • C:\Users\Admin\AppData\Local\Temp\mnjowjlwjovv.exe
      MD5

      38b69ef4c1d553a9c41927b97d3401a6

      SHA1

      58e4e6e2db1d4870c8bd98015f6cdc84d3534dbd

      SHA256

      be391444eedc666fd587007fcf60f78120bfe056666b0784b6063a4e332aac97

      SHA512

      79d021e36175388e0e3031d5c95ab246b64a5844deb1a4342b241b68aad71f6ff7cb4a7a5bca2f8804afea78af7c56108f552176eaa08aa02584b79f827fb854

    • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
      MD5

      3c539776cf69aedac424e1f9c14494ad

      SHA1

      4d64404d18d7084628b86dac75bf8cfade34ae1d

      SHA256

      6fe38946bca0129a8b4bd412611c7b4a330b0b0d54c83e87293e52e83f9b007e

      SHA512

      9fe1015afb1a8ebf964d6016c534ff8433bdb8b0ee040f8483103cd056761e6bb2b9ca1246b916459df4249d1dfcf91f1b19b978725ce0eba66b4e8d65bdda67

    • C:\Users\Admin\AppData\Roaming\Smart Clock\SmartClock.exe
      MD5

      3c539776cf69aedac424e1f9c14494ad

      SHA1

      4d64404d18d7084628b86dac75bf8cfade34ae1d

      SHA256

      6fe38946bca0129a8b4bd412611c7b4a330b0b0d54c83e87293e52e83f9b007e

      SHA512

      9fe1015afb1a8ebf964d6016c534ff8433bdb8b0ee040f8483103cd056761e6bb2b9ca1246b916459df4249d1dfcf91f1b19b978725ce0eba66b4e8d65bdda67

    • \Users\Admin\AppData\Local\Temp\MNJOWJ~1.TMP
      MD5

      808d3ad409144db9e8a6e645713690a4

      SHA1

      3632c2550c1163703cd179cc9ccdc6aa4dd73bce

      SHA256

      c9d0491f301ac2effbf939ab104c0d73942d86b03db34b96a1a85847e37b71e5

      SHA512

      2dda74f88d3065c9b7cf09e06d2be92d32042ad5e1abb001e54c72ddb7949530aaaaa24c45490517c121305c7f572c306dd3f0b9c0d2b2f888eba71931747e30

    • \Users\Admin\AppData\Local\Temp\MNJOWJ~1.TMP
      MD5

      808d3ad409144db9e8a6e645713690a4

      SHA1

      3632c2550c1163703cd179cc9ccdc6aa4dd73bce

      SHA256

      c9d0491f301ac2effbf939ab104c0d73942d86b03db34b96a1a85847e37b71e5

      SHA512

      2dda74f88d3065c9b7cf09e06d2be92d32042ad5e1abb001e54c72ddb7949530aaaaa24c45490517c121305c7f572c306dd3f0b9c0d2b2f888eba71931747e30

    • \Users\Admin\AppData\Local\Temp\nsj102E.tmp\UAC.dll
      MD5

      adb29e6b186daa765dc750128649b63d

      SHA1

      160cbdc4cb0ac2c142d361df138c537aa7e708c9

      SHA256

      2f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08

      SHA512

      b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada

    • memory/628-114-0x0000000002390000-0x0000000002471000-memory.dmp
      Filesize

      900KB

    • memory/628-115-0x0000000000400000-0x00000000004E5000-memory.dmp
      Filesize

      916KB

    • memory/876-157-0x0000000000B10000-0x0000000000C6F000-memory.dmp
      Filesize

      1.4MB

    • memory/876-153-0x0000000000000000-mapping.dmp
    • memory/1500-117-0x0000000000000000-mapping.dmp
    • memory/1540-144-0x00000000004D0000-0x00000000004F4000-memory.dmp
      Filesize

      144KB

    • memory/1540-145-0x0000000000400000-0x0000000000472000-memory.dmp
      Filesize

      456KB

    • memory/1540-124-0x0000000000000000-mapping.dmp
    • memory/1780-116-0x0000000000000000-mapping.dmp
    • memory/2156-127-0x0000000000000000-mapping.dmp
    • memory/3008-160-0x0000000000000000-mapping.dmp
    • memory/3416-149-0x0000000000000000-mapping.dmp
    • memory/3908-138-0x0000000000000000-mapping.dmp
    • memory/3920-143-0x0000000000400000-0x0000000000472000-memory.dmp
      Filesize

      456KB

    • memory/3920-142-0x0000000000480000-0x00000000005CA000-memory.dmp
      Filesize

      1.3MB

    • memory/3920-121-0x0000000000000000-mapping.dmp
    • memory/3964-146-0x0000000000000000-mapping.dmp
    • memory/3964-158-0x0000000002370000-0x0000000002470000-memory.dmp
      Filesize

      1024KB

    • memory/3964-159-0x0000000000400000-0x0000000000548000-memory.dmp
      Filesize

      1.3MB

    • memory/4012-152-0x0000000000400000-0x0000000000472000-memory.dmp
      Filesize

      456KB

    • memory/4012-151-0x00000000005A0000-0x00000000006EA000-memory.dmp
      Filesize

      1.3MB

    • memory/4012-139-0x0000000000000000-mapping.dmp