Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
29-12-2021 07:55
Static task
static1
Behavioral task
behavioral1
Sample
8b2242c04e274c84a8dc25bcab75158f.exe
Resource
win7-en-20211208
General
-
Target
8b2242c04e274c84a8dc25bcab75158f.exe
-
Size
2.6MB
-
MD5
8b2242c04e274c84a8dc25bcab75158f
-
SHA1
33d4c61dca4ab2392f23b18ac3188491db586f0f
-
SHA256
2dfc078c3658a63016fd846cc735c0d5c359b6639cb89ae08ccc9a19fb3e5df3
-
SHA512
f26bb2f323140ce71dcbc174b298cca7f9803be20322d64b9ccaf254763ae93ca53a7382942c42dc4ca7b7454dc8147a9df8c91962c9200e9d83835a0f5430ab
Malware Config
Extracted
cryptbot
hevzbn22.top
morwce02.top
-
payload_url
http://kyvgns02.top/download.php?file=finjan.exe
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
8b2242c04e274c84a8dc25bcab75158f.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8b2242c04e274c84a8dc25bcab75158f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8b2242c04e274c84a8dc25bcab75158f.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1860 cmd.exe -
Processes:
resource yara_rule behavioral1/memory/1844-54-0x0000000000E00000-0x00000000014E6000-memory.dmp themida behavioral1/memory/1844-55-0x0000000000E00000-0x00000000014E6000-memory.dmp themida behavioral1/memory/1844-56-0x0000000000E00000-0x00000000014E6000-memory.dmp themida behavioral1/memory/1844-57-0x0000000000E00000-0x00000000014E6000-memory.dmp themida -
Processes:
8b2242c04e274c84a8dc25bcab75158f.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 8b2242c04e274c84a8dc25bcab75158f.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
8b2242c04e274c84a8dc25bcab75158f.exepid process 1844 8b2242c04e274c84a8dc25bcab75158f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
8b2242c04e274c84a8dc25bcab75158f.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 8b2242c04e274c84a8dc25bcab75158f.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 8b2242c04e274c84a8dc25bcab75158f.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 660 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
8b2242c04e274c84a8dc25bcab75158f.exepid process 1844 8b2242c04e274c84a8dc25bcab75158f.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
8b2242c04e274c84a8dc25bcab75158f.execmd.exedescription pid process target process PID 1844 wrote to memory of 1860 1844 8b2242c04e274c84a8dc25bcab75158f.exe cmd.exe PID 1844 wrote to memory of 1860 1844 8b2242c04e274c84a8dc25bcab75158f.exe cmd.exe PID 1844 wrote to memory of 1860 1844 8b2242c04e274c84a8dc25bcab75158f.exe cmd.exe PID 1844 wrote to memory of 1860 1844 8b2242c04e274c84a8dc25bcab75158f.exe cmd.exe PID 1860 wrote to memory of 660 1860 cmd.exe timeout.exe PID 1860 wrote to memory of 660 1860 cmd.exe timeout.exe PID 1860 wrote to memory of 660 1860 cmd.exe timeout.exe PID 1860 wrote to memory of 660 1860 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b2242c04e274c84a8dc25bcab75158f.exe"C:\Users\Admin\AppData\Local\Temp\8b2242c04e274c84a8dc25bcab75158f.exe"1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\yAZCwALc & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\8b2242c04e274c84a8dc25bcab75158f.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- Delays execution with timeout.exe
PID:660
-
-