Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
27-12-2021 17:08
Static task
static1
Behavioral task
behavioral1
Sample
55e7693d5a0b716ad7ab1dcccc415f3f.exe
Resource
win7-en-20211208
General
-
Target
55e7693d5a0b716ad7ab1dcccc415f3f.exe
-
Size
2.7MB
-
MD5
55e7693d5a0b716ad7ab1dcccc415f3f
-
SHA1
191303ed147c489d4b81838d60f932bf6c16c521
-
SHA256
43177ddc1570d4f98b6dfcea2df466e25910143d37c1a006c85deafecf2ff200
-
SHA512
4927bb43bc86062951e209448eeb2841de0918aa548604f0f4549ca636015f48034e7253a1599cd7c178c39613d31417e5cd80f050fa0f90df9b451cfb6e3cb6
Malware Config
Extracted
cryptbot
daipey72.top
morboh07.top
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
55e7693d5a0b716ad7ab1dcccc415f3f.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 55e7693d5a0b716ad7ab1dcccc415f3f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 55e7693d5a0b716ad7ab1dcccc415f3f.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1928 cmd.exe -
Processes:
resource yara_rule behavioral1/memory/452-54-0x0000000001210000-0x00000000018FD000-memory.dmp themida behavioral1/memory/452-55-0x0000000001210000-0x00000000018FD000-memory.dmp themida behavioral1/memory/452-56-0x0000000001210000-0x00000000018FD000-memory.dmp themida behavioral1/memory/452-57-0x0000000001210000-0x00000000018FD000-memory.dmp themida -
Processes:
55e7693d5a0b716ad7ab1dcccc415f3f.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 55e7693d5a0b716ad7ab1dcccc415f3f.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
55e7693d5a0b716ad7ab1dcccc415f3f.exepid process 452 55e7693d5a0b716ad7ab1dcccc415f3f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
55e7693d5a0b716ad7ab1dcccc415f3f.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 55e7693d5a0b716ad7ab1dcccc415f3f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 55e7693d5a0b716ad7ab1dcccc415f3f.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 468 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
55e7693d5a0b716ad7ab1dcccc415f3f.exepid process 452 55e7693d5a0b716ad7ab1dcccc415f3f.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
55e7693d5a0b716ad7ab1dcccc415f3f.execmd.exedescription pid process target process PID 452 wrote to memory of 1928 452 55e7693d5a0b716ad7ab1dcccc415f3f.exe cmd.exe PID 452 wrote to memory of 1928 452 55e7693d5a0b716ad7ab1dcccc415f3f.exe cmd.exe PID 452 wrote to memory of 1928 452 55e7693d5a0b716ad7ab1dcccc415f3f.exe cmd.exe PID 452 wrote to memory of 1928 452 55e7693d5a0b716ad7ab1dcccc415f3f.exe cmd.exe PID 1928 wrote to memory of 468 1928 cmd.exe timeout.exe PID 1928 wrote to memory of 468 1928 cmd.exe timeout.exe PID 1928 wrote to memory of 468 1928 cmd.exe timeout.exe PID 1928 wrote to memory of 468 1928 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\55e7693d5a0b716ad7ab1dcccc415f3f.exe"C:\Users\Admin\AppData\Local\Temp\55e7693d5a0b716ad7ab1dcccc415f3f.exe"1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\MllrofcSMfFrj & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\55e7693d5a0b716ad7ab1dcccc415f3f.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- Delays execution with timeout.exe
PID:468
-
-