Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
22-12-2021 18:28
Static task
static1
Behavioral task
behavioral1
Sample
d6067855ac984e670b392dd61df3d362.exe
Resource
win7-en-20211208
General
-
Target
d6067855ac984e670b392dd61df3d362.exe
-
Size
2.6MB
-
MD5
d6067855ac984e670b392dd61df3d362
-
SHA1
9320204b0d517cc239a948514982540e6652bbff
-
SHA256
5794e9722cdb1ec697ee0ae9fe5464fb9e85ba3157485d6ecb9cea44455cf37a
-
SHA512
583db7379dd2f7730a2efcf25a118170f59edf6e332f9b946b63df6323317b4d6ff155f9fa4c64041efdc7880fd70714c14b053f2d6ceb330b8ded35e55a8ce9
Malware Config
Extracted
cryptbot
daispg32.top
morsvo03.top
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
d6067855ac984e670b392dd61df3d362.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d6067855ac984e670b392dd61df3d362.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d6067855ac984e670b392dd61df3d362.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1300 cmd.exe -
Processes:
resource yara_rule behavioral1/memory/1684-56-0x0000000000C90000-0x0000000001370000-memory.dmp themida behavioral1/memory/1684-57-0x0000000000C90000-0x0000000001370000-memory.dmp themida behavioral1/memory/1684-58-0x0000000000C90000-0x0000000001370000-memory.dmp themida behavioral1/memory/1684-59-0x0000000000C90000-0x0000000001370000-memory.dmp themida -
Processes:
d6067855ac984e670b392dd61df3d362.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA d6067855ac984e670b392dd61df3d362.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
d6067855ac984e670b392dd61df3d362.exepid process 1684 d6067855ac984e670b392dd61df3d362.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
d6067855ac984e670b392dd61df3d362.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 d6067855ac984e670b392dd61df3d362.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString d6067855ac984e670b392dd61df3d362.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 520 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
d6067855ac984e670b392dd61df3d362.exepid process 1684 d6067855ac984e670b392dd61df3d362.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
d6067855ac984e670b392dd61df3d362.execmd.exedescription pid process target process PID 1684 wrote to memory of 1300 1684 d6067855ac984e670b392dd61df3d362.exe cmd.exe PID 1684 wrote to memory of 1300 1684 d6067855ac984e670b392dd61df3d362.exe cmd.exe PID 1684 wrote to memory of 1300 1684 d6067855ac984e670b392dd61df3d362.exe cmd.exe PID 1684 wrote to memory of 1300 1684 d6067855ac984e670b392dd61df3d362.exe cmd.exe PID 1300 wrote to memory of 520 1300 cmd.exe timeout.exe PID 1300 wrote to memory of 520 1300 cmd.exe timeout.exe PID 1300 wrote to memory of 520 1300 cmd.exe timeout.exe PID 1300 wrote to memory of 520 1300 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6067855ac984e670b392dd61df3d362.exe"C:\Users\Admin\AppData\Local\Temp\d6067855ac984e670b392dd61df3d362.exe"1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\gYvpkTOGmeYl & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\d6067855ac984e670b392dd61df3d362.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- Delays execution with timeout.exe
PID:520
-
-