Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    05-12-2021 10:54

General

  • Target

    fc0701924aed7be6e65f20c16d222ef6.exe

  • Size

    392KB

  • MD5

    fc0701924aed7be6e65f20c16d222ef6

  • SHA1

    c04d8dee265d5ed32f30f9bf466b6d2676dae4eb

  • SHA256

    82a634123b202b7960b6cc3b52125352a2006e40cc2ccf3d62c1519191981e71

  • SHA512

    eea30d68123f94587d324a58a31f51bba985bd2750607a8615f370cd2c79b73ace4ea7ec00a3e6a009118064169859f150cf5e489d587454cbaa2b0f42234aee

Malware Config

Extracted

Family

cryptbot

C2

unic12m.top

unic12e.top

Signatures

  • CryptBot

    A C++ stealer distributed widely in bundle with other software.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fc0701924aed7be6e65f20c16d222ef6.exe
    "C:\Users\Admin\AppData\Local\Temp\fc0701924aed7be6e65f20c16d222ef6.exe"
    1⤵
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:3380
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\rikIfNPY & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\fc0701924aed7be6e65f20c16d222ef6.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:452
      • C:\Windows\SysWOW64\timeout.exe
        timeout 4
        3⤵
        • Delays execution with timeout.exe
        PID:1916

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rikIfNPY\NIDCOP~1.ZIP

    MD5

    a862ccaa63535c58f2b700e358324e4b

    SHA1

    34d87cc124ff5071770848bab93604c25082c4de

    SHA256

    e08209b02b14ac117dfe536ab7a5eed505aedac9e28042e8683c0cec265b23b7

    SHA512

    b1abb99a13a52e73860ce8c5c057caf27c4b22c2263584f5262459bf43d2eaa5fa2e9418977a3988812ec62bc73e50d7bb7ac733e7b363fef8a8731cbd23f3e5

  • C:\Users\Admin\AppData\Local\Temp\rikIfNPY\ZRHRLT~1.ZIP

    MD5

    adfda80fe67585a7f6bcf2f671c84c47

    SHA1

    c2f5ff4d4730cf79bb85dcaf19c9f5695db4320b

    SHA256

    72e8bd1419d881bf31de53683c6145182d7d04d29fe9e79d8e6a5edbb78da8a3

    SHA512

    f78eb35b1f22859d659c1c450122fb35dd5e471a80748a8a2979bf4b8e2d49d79609c199bf26fc034507426220e3a67de47b5f649f373ce42590e24ec868c732

  • C:\Users\Admin\AppData\Local\Temp\rikIfNPY\_Files\_Chrome\DEFAUL~1.BIN

    MD5

    d4026455697acb78d4f621b54352b4f0

    SHA1

    f32214a2fa38ee0eadb6b38b0cd444dc34ebc2c9

    SHA256

    2e28af610200cae02bd440c87bee8508a08c65510e83916acf94f96faf6d7624

    SHA512

    efb97c89babef3239063c4bb4230f5458474b4141dc128e84a4fe0e4067bc3e8a5ba6e2f6fc87568619af12c05731d121ccf73acbcd9ba06afd5fe92f65a2f76

  • C:\Users\Admin\AppData\Local\Temp\rikIfNPY\_Files\_Chrome\DEFAUL~1.DB

    MD5

    b608d407fc15adea97c26936bc6f03f6

    SHA1

    953e7420801c76393902c0d6bb56148947e41571

    SHA256

    b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf

    SHA512

    cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4

  • C:\Users\Admin\AppData\Local\Temp\rikIfNPY\_Files\_Chrome\DEFAUL~2.DB

    MD5

    055c8c5c47424f3c2e7a6fc2ee904032

    SHA1

    5952781d22cff35d94861fac25d89a39af6d0a87

    SHA256

    531b3121bd59938df4933972344d936a67e75d8b1741807a8a51c898d185dd2a

    SHA512

    c2772893695f49cb185add62c35284779b20d45adc01184f1912613fa8b2d70c8e785f0d7cfa3bfaf1d2d58e7cdc74f4304fd973a956601927719d6d370dd57a

  • C:\Users\Admin\AppData\Local\Temp\rikIfNPY\_Files\_Chrome\DEFAUL~3.DB

    MD5

    8ee018331e95a610680a789192a9d362

    SHA1

    e1fba0ac3f3d8689acf6c2ee26afdfd0c8e02df9

    SHA256

    94354ea6703c5ef5fa052aeb1d29715587d80300858ebc063a61c02b7e6e9575

    SHA512

    4b89b5adc77641e497eda7db62a48fee7b4b8dda83bff637cac850645d31deb93aafee5afeb41390e07fd16505a63f418b6cb153a1d35777c483e2d6d3f783b4

  • C:\Users\Admin\AppData\Local\Temp\rikIfNPY\_Files\_Files\DISABL~1.TXT

    MD5

    0d3f5ea0aa6b1635b061a41f47b68e75

    SHA1

    2bb88d876391c6c1bdb28bb6a743442206af8863

    SHA256

    7a9141d06df6720d94a6c3c388a081cded683275016b5ea5b18d0d389c543933

    SHA512

    652f3883a691585e3e6491ecb811e789647f294d0350b765275a66cdf0a55db55f5243619b7c2c45a8657f7f76e24929a62563dddf89e797dca92457a9893196

  • C:\Users\Admin\AppData\Local\Temp\rikIfNPY\_Files\_Files\UNREGI~1.TXT

    MD5

    6484b70a65e9e449aeecf71ade3da5ea

    SHA1

    46e44bafa1b01121061aaccf649580e2a975005d

    SHA256

    30877ba8c7a316cbdd68332239c554925e506ce53226e5588af123d0040a6387

    SHA512

    6c63c60125f12cff4a6aa0016e6eaeaffca99e0ed24a43398bbd74e72721152e42cab2e79a08cf286e7d75f2242e27672594d21a386dcec02315f547fd3f013c

  • C:\Users\Admin\AppData\Local\Temp\rikIfNPY\_Files\_INFOR~1.TXT

    MD5

    2aaed15e744806362caf54ab57f2a0c8

    SHA1

    2fe45651b76acc33c0dfc82ae57ccd632cf8aba1

    SHA256

    f350388294913337c5c1556f75b5b9f929b8ad17805c9244c0461ad6ca04a830

    SHA512

    a164d5fd6f6f4c434395a1a852f33326f0d6eca98e74437ef4860e488f801cbcee32caf280a289712b3efe6e89f1e4c4d87ed216c9e58e67a49d0289a2aeef6b

  • C:\Users\Admin\AppData\Local\Temp\rikIfNPY\_Files\_SCREE~1.JPE

    MD5

    193df10cfcd598fd657105632869d00a

    SHA1

    fb34b7d69e8f354711ac9f4fc6f8d4c45b7adbe5

    SHA256

    6fc484b0494ccbcbf59235e8e4256221ff4f3546e334ec91bdc691de3a3cac61

    SHA512

    0163a5a1fe65fd8263618a09b94bb4444c95feb3db4d853c8493cdb00dffb9fd1cb6aefe97d54d76a7d173c3530935ab7deab33e7b0bd4210963e6b96f503e48

  • C:\Users\Admin\AppData\Local\Temp\rikIfNPY\files_\SCREEN~1.JPG

    MD5

    193df10cfcd598fd657105632869d00a

    SHA1

    fb34b7d69e8f354711ac9f4fc6f8d4c45b7adbe5

    SHA256

    6fc484b0494ccbcbf59235e8e4256221ff4f3546e334ec91bdc691de3a3cac61

    SHA512

    0163a5a1fe65fd8263618a09b94bb4444c95feb3db4d853c8493cdb00dffb9fd1cb6aefe97d54d76a7d173c3530935ab7deab33e7b0bd4210963e6b96f503e48

  • C:\Users\Admin\AppData\Local\Temp\rikIfNPY\files_\SYSTEM~1.TXT

    MD5

    2aaed15e744806362caf54ab57f2a0c8

    SHA1

    2fe45651b76acc33c0dfc82ae57ccd632cf8aba1

    SHA256

    f350388294913337c5c1556f75b5b9f929b8ad17805c9244c0461ad6ca04a830

    SHA512

    a164d5fd6f6f4c434395a1a852f33326f0d6eca98e74437ef4860e488f801cbcee32caf280a289712b3efe6e89f1e4c4d87ed216c9e58e67a49d0289a2aeef6b

  • C:\Users\Admin\AppData\Local\Temp\rikIfNPY\files_\_Chrome\DEFAUL~1.BIN

    MD5

    d4026455697acb78d4f621b54352b4f0

    SHA1

    f32214a2fa38ee0eadb6b38b0cd444dc34ebc2c9

    SHA256

    2e28af610200cae02bd440c87bee8508a08c65510e83916acf94f96faf6d7624

    SHA512

    efb97c89babef3239063c4bb4230f5458474b4141dc128e84a4fe0e4067bc3e8a5ba6e2f6fc87568619af12c05731d121ccf73acbcd9ba06afd5fe92f65a2f76

  • C:\Users\Admin\AppData\Local\Temp\rikIfNPY\files_\_Chrome\DEFAUL~1.DB

    MD5

    b608d407fc15adea97c26936bc6f03f6

    SHA1

    953e7420801c76393902c0d6bb56148947e41571

    SHA256

    b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf

    SHA512

    cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4

  • C:\Users\Admin\AppData\Local\Temp\rikIfNPY\files_\_Chrome\DEFAUL~2.DB

    MD5

    055c8c5c47424f3c2e7a6fc2ee904032

    SHA1

    5952781d22cff35d94861fac25d89a39af6d0a87

    SHA256

    531b3121bd59938df4933972344d936a67e75d8b1741807a8a51c898d185dd2a

    SHA512

    c2772893695f49cb185add62c35284779b20d45adc01184f1912613fa8b2d70c8e785f0d7cfa3bfaf1d2d58e7cdc74f4304fd973a956601927719d6d370dd57a

  • C:\Users\Admin\AppData\Local\Temp\rikIfNPY\files_\_Chrome\DEFAUL~3.DB

    MD5

    8ee018331e95a610680a789192a9d362

    SHA1

    e1fba0ac3f3d8689acf6c2ee26afdfd0c8e02df9

    SHA256

    94354ea6703c5ef5fa052aeb1d29715587d80300858ebc063a61c02b7e6e9575

    SHA512

    4b89b5adc77641e497eda7db62a48fee7b4b8dda83bff637cac850645d31deb93aafee5afeb41390e07fd16505a63f418b6cb153a1d35777c483e2d6d3f783b4

  • C:\Users\Admin\AppData\Local\Temp\rikIfNPY\files_\files\DISABL~1.TXT

    MD5

    0d3f5ea0aa6b1635b061a41f47b68e75

    SHA1

    2bb88d876391c6c1bdb28bb6a743442206af8863

    SHA256

    7a9141d06df6720d94a6c3c388a081cded683275016b5ea5b18d0d389c543933

    SHA512

    652f3883a691585e3e6491ecb811e789647f294d0350b765275a66cdf0a55db55f5243619b7c2c45a8657f7f76e24929a62563dddf89e797dca92457a9893196

  • C:\Users\Admin\AppData\Local\Temp\rikIfNPY\files_\files\UNREGI~1.TXT

    MD5

    6484b70a65e9e449aeecf71ade3da5ea

    SHA1

    46e44bafa1b01121061aaccf649580e2a975005d

    SHA256

    30877ba8c7a316cbdd68332239c554925e506ce53226e5588af123d0040a6387

    SHA512

    6c63c60125f12cff4a6aa0016e6eaeaffca99e0ed24a43398bbd74e72721152e42cab2e79a08cf286e7d75f2242e27672594d21a386dcec02315f547fd3f013c

  • memory/452-118-0x0000000000000000-mapping.dmp

  • memory/1916-137-0x0000000000000000-mapping.dmp

  • memory/3380-115-0x00000000007D9000-0x00000000007FF000-memory.dmp

    Filesize

    152KB

  • memory/3380-117-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/3380-116-0x00000000006E0000-0x0000000000727000-memory.dmp

    Filesize

    284KB