Analysis
-
max time kernel
119s -
max time network
124s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
05-12-2021 10:54
Static task
static1
Behavioral task
behavioral1
Sample
fc0701924aed7be6e65f20c16d222ef6.exe
Resource
win7-en-20211104
windows7_x64
0 signatures
0 seconds
General
-
Target
fc0701924aed7be6e65f20c16d222ef6.exe
-
Size
392KB
-
MD5
fc0701924aed7be6e65f20c16d222ef6
-
SHA1
c04d8dee265d5ed32f30f9bf466b6d2676dae4eb
-
SHA256
82a634123b202b7960b6cc3b52125352a2006e40cc2ccf3d62c1519191981e71
-
SHA512
eea30d68123f94587d324a58a31f51bba985bd2750607a8615f370cd2c79b73ace4ea7ec00a3e6a009118064169859f150cf5e489d587454cbaa2b0f42234aee
Malware Config
Extracted
Family
cryptbot
C2
unic12m.top
unic12e.top
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 860 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
fc0701924aed7be6e65f20c16d222ef6.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString fc0701924aed7be6e65f20c16d222ef6.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 fc0701924aed7be6e65f20c16d222ef6.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid Process 1472 timeout.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
fc0701924aed7be6e65f20c16d222ef6.execmd.exedescription pid Process procid_target PID 1520 wrote to memory of 860 1520 fc0701924aed7be6e65f20c16d222ef6.exe 28 PID 1520 wrote to memory of 860 1520 fc0701924aed7be6e65f20c16d222ef6.exe 28 PID 1520 wrote to memory of 860 1520 fc0701924aed7be6e65f20c16d222ef6.exe 28 PID 1520 wrote to memory of 860 1520 fc0701924aed7be6e65f20c16d222ef6.exe 28 PID 860 wrote to memory of 1472 860 cmd.exe 30 PID 860 wrote to memory of 1472 860 cmd.exe 30 PID 860 wrote to memory of 1472 860 cmd.exe 30 PID 860 wrote to memory of 1472 860 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc0701924aed7be6e65f20c16d222ef6.exe"C:\Users\Admin\AppData\Local\Temp\fc0701924aed7be6e65f20c16d222ef6.exe"1⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\XVAVplSkZOC & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\fc0701924aed7be6e65f20c16d222ef6.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- Delays execution with timeout.exe
PID:1472
-
-