Analysis
-
max time kernel
94s -
max time network
124s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
07-01-2022 17:29
Static task
static1
General
-
Target
e69353b185a7f1fe20ea84f15f75e4aa11337aa39fed08c119c60780822849fe.exe
-
Size
2.7MB
-
MD5
dee78a613440b0750785f5420dac9d40
-
SHA1
b99176834f913890adcc1bc9fbb90262ab4483d5
-
SHA256
e69353b185a7f1fe20ea84f15f75e4aa11337aa39fed08c119c60780822849fe
-
SHA512
26e37049fccc4b1fdbc2962c09d706c5dbfe362538b450ef8c21b11f3786c276389b08511fefb45a004656c123ad6151030266f3df7160e92ec4d7f1c937b906
Malware Config
Extracted
cryptbot
zyoenm52.top
morlse05.top
-
payload_url
http://yapome07.top/download.php?file=combir.exe
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
File.exeDpEditor.exepid process 2972 File.exe 1368 DpEditor.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
e69353b185a7f1fe20ea84f15f75e4aa11337aa39fed08c119c60780822849fe.exeFile.exeDpEditor.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e69353b185a7f1fe20ea84f15f75e4aa11337aa39fed08c119c60780822849fe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e69353b185a7f1fe20ea84f15f75e4aa11337aa39fed08c119c60780822849fe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion File.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion File.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DpEditor.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DpEditor.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/memory/380-115-0x0000000001230000-0x000000000191B000-memory.dmp themida behavioral1/memory/380-116-0x0000000001230000-0x000000000191B000-memory.dmp themida behavioral1/memory/380-118-0x0000000001230000-0x000000000191B000-memory.dmp themida behavioral1/memory/380-119-0x0000000001230000-0x000000000191B000-memory.dmp themida C:\Users\Admin\AppData\Local\Temp\File.exe themida C:\Users\Admin\AppData\Local\Temp\File.exe themida behavioral1/memory/2972-130-0x0000000000360000-0x0000000000A55000-memory.dmp themida behavioral1/memory/2972-131-0x0000000000360000-0x0000000000A55000-memory.dmp themida behavioral1/memory/2972-139-0x0000000000360000-0x0000000000A55000-memory.dmp themida behavioral1/memory/2972-140-0x0000000000360000-0x0000000000A55000-memory.dmp themida C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe themida C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe themida behavioral1/memory/1368-148-0x0000000000B50000-0x0000000001245000-memory.dmp themida behavioral1/memory/1368-149-0x0000000000B50000-0x0000000001245000-memory.dmp themida behavioral1/memory/1368-150-0x0000000000B50000-0x0000000001245000-memory.dmp themida behavioral1/memory/1368-151-0x0000000000B50000-0x0000000001245000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
DpEditor.exee69353b185a7f1fe20ea84f15f75e4aa11337aa39fed08c119c60780822849fe.exeFile.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DpEditor.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA e69353b185a7f1fe20ea84f15f75e4aa11337aa39fed08c119c60780822849fe.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA File.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
e69353b185a7f1fe20ea84f15f75e4aa11337aa39fed08c119c60780822849fe.exeFile.exeDpEditor.exepid process 380 e69353b185a7f1fe20ea84f15f75e4aa11337aa39fed08c119c60780822849fe.exe 2972 File.exe 1368 DpEditor.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
e69353b185a7f1fe20ea84f15f75e4aa11337aa39fed08c119c60780822849fe.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 e69353b185a7f1fe20ea84f15f75e4aa11337aa39fed08c119c60780822849fe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString e69353b185a7f1fe20ea84f15f75e4aa11337aa39fed08c119c60780822849fe.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 3292 timeout.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
DpEditor.exepid process 1368 DpEditor.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
e69353b185a7f1fe20ea84f15f75e4aa11337aa39fed08c119c60780822849fe.exeFile.exeDpEditor.exepid process 380 e69353b185a7f1fe20ea84f15f75e4aa11337aa39fed08c119c60780822849fe.exe 380 e69353b185a7f1fe20ea84f15f75e4aa11337aa39fed08c119c60780822849fe.exe 2972 File.exe 2972 File.exe 1368 DpEditor.exe 1368 DpEditor.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
e69353b185a7f1fe20ea84f15f75e4aa11337aa39fed08c119c60780822849fe.execmd.exeFile.exedescription pid process target process PID 380 wrote to memory of 2972 380 e69353b185a7f1fe20ea84f15f75e4aa11337aa39fed08c119c60780822849fe.exe File.exe PID 380 wrote to memory of 2972 380 e69353b185a7f1fe20ea84f15f75e4aa11337aa39fed08c119c60780822849fe.exe File.exe PID 380 wrote to memory of 2972 380 e69353b185a7f1fe20ea84f15f75e4aa11337aa39fed08c119c60780822849fe.exe File.exe PID 380 wrote to memory of 1052 380 e69353b185a7f1fe20ea84f15f75e4aa11337aa39fed08c119c60780822849fe.exe cmd.exe PID 380 wrote to memory of 1052 380 e69353b185a7f1fe20ea84f15f75e4aa11337aa39fed08c119c60780822849fe.exe cmd.exe PID 380 wrote to memory of 1052 380 e69353b185a7f1fe20ea84f15f75e4aa11337aa39fed08c119c60780822849fe.exe cmd.exe PID 1052 wrote to memory of 3292 1052 cmd.exe timeout.exe PID 1052 wrote to memory of 3292 1052 cmd.exe timeout.exe PID 1052 wrote to memory of 3292 1052 cmd.exe timeout.exe PID 2972 wrote to memory of 1368 2972 File.exe DpEditor.exe PID 2972 wrote to memory of 1368 2972 File.exe DpEditor.exe PID 2972 wrote to memory of 1368 2972 File.exe DpEditor.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e69353b185a7f1fe20ea84f15f75e4aa11337aa39fed08c119c60780822849fe.exe"C:\Users\Admin\AppData\Local\Temp\e69353b185a7f1fe20ea84f15f75e4aa11337aa39fed08c119c60780822849fe.exe"1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Users\Admin\AppData\Local\Temp\File.exe"C:\Users\Admin\AppData\Local\Temp\File.exe"2⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe"C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exe"3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
PID:1368 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\YuIejIluoJ & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\e69353b185a7f1fe20ea84f15f75e4aa11337aa39fed08c119c60780822849fe.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- Delays execution with timeout.exe
PID:3292
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\File.exeMD5
13ec5227fe52bcf2fc8ca6b1dcc07641
SHA121a546771c1acdde48a8be21081ce0ae1e376bfb
SHA25660c546941d7f705156881e6776c482c50f133d54ba520436291695fd39bff8bb
SHA512bcd479d71b5f7a8a294d647f66ba2c7670c39270142bb86cf96a8ffb97a7d5dcefb654c29c926fd2f43917a7da9ca11215012e5a109aad6062ef9e9e65355928
-
C:\Users\Admin\AppData\Local\Temp\File.exeMD5
13ec5227fe52bcf2fc8ca6b1dcc07641
SHA121a546771c1acdde48a8be21081ce0ae1e376bfb
SHA25660c546941d7f705156881e6776c482c50f133d54ba520436291695fd39bff8bb
SHA512bcd479d71b5f7a8a294d647f66ba2c7670c39270142bb86cf96a8ffb97a7d5dcefb654c29c926fd2f43917a7da9ca11215012e5a109aad6062ef9e9e65355928
-
C:\Users\Admin\AppData\Local\Temp\YuIejIluoJ\QCMPLA~1.ZIPMD5
2d4339874666d5e3c1972b192ee0d809
SHA1a10cd066d8c138e2809d66d59b78b225d31cdb8f
SHA25623ee8705c62194b8ea2166717dee861542deb7ef1f08184de3edbc6abb0946d8
SHA512c6dc04145c723dfe0d0ecbf2557385fdf7336248d3dda9edaed1d1919e4df14b0ae2485f855f104df743c64477360ffaa7bb54a0213ee1f9d68af9d40af28dd9
-
C:\Users\Admin\AppData\Local\Temp\YuIejIluoJ\QXWYED~1.ZIPMD5
c8b4c80a3b127d66b176bc7036b207f7
SHA10f441b05d82b9dec60f1308227d78d8a74807b36
SHA25682e915cda6ca692283ae761067aa83ae15aeb3cf9f76e5c0b97722866b46ba17
SHA51256ca594ed49c9dbe33fee74752f7e50479c2f4f206b5dd63809b09ad5fa89ad740dd8ef4a43bb5414d855b945a3020e9b015f1d266052d9bd430970240600465
-
C:\Users\Admin\AppData\Local\Temp\YuIejIluoJ\_Files\_Chrome\DEFAUL~1.BINMD5
09500b419541e759ce53d87e324fe8fc
SHA14b882732508d2fc28536f8281c3b58777720c7da
SHA256f80e7db7d3a06c87f03f5d0a9c7ab592ef05bc4fa5a8ab65c318c8455bd94476
SHA51245e04f6283559638be00bffaf1a52a52a6998f835d5d40f756806a2323623074cb7ee9f802f4eba7d7523ccf3170f8986f89349ffbc1f2514ce25fdae0114fde
-
C:\Users\Admin\AppData\Local\Temp\YuIejIluoJ\_Files\_Chrome\DEFAUL~1.DBMD5
b608d407fc15adea97c26936bc6f03f6
SHA1953e7420801c76393902c0d6bb56148947e41571
SHA256b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf
SHA512cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4
-
C:\Users\Admin\AppData\Local\Temp\YuIejIluoJ\_Files\_Chrome\DEFAUL~2.DBMD5
055c8c5c47424f3c2e7a6fc2ee904032
SHA15952781d22cff35d94861fac25d89a39af6d0a87
SHA256531b3121bd59938df4933972344d936a67e75d8b1741807a8a51c898d185dd2a
SHA512c2772893695f49cb185add62c35284779b20d45adc01184f1912613fa8b2d70c8e785f0d7cfa3bfaf1d2d58e7cdc74f4304fd973a956601927719d6d370dd57a
-
C:\Users\Admin\AppData\Local\Temp\YuIejIluoJ\_Files\_Chrome\DEFAUL~3.DBMD5
8ee018331e95a610680a789192a9d362
SHA1e1fba0ac3f3d8689acf6c2ee26afdfd0c8e02df9
SHA25694354ea6703c5ef5fa052aeb1d29715587d80300858ebc063a61c02b7e6e9575
SHA5124b89b5adc77641e497eda7db62a48fee7b4b8dda83bff637cac850645d31deb93aafee5afeb41390e07fd16505a63f418b6cb153a1d35777c483e2d6d3f783b4
-
C:\Users\Admin\AppData\Local\Temp\YuIejIluoJ\_Files\_INFOR~1.TXTMD5
7c63b91119715c60ec69816dfc0f8d04
SHA180310b97915ab0ed962914cf69eca1355b36dffa
SHA256fc5c0d8d667f76f66bafa76ddf369a01d2476020a82ca54da2df6b6efe7743af
SHA512f78d9d89183fd09e34ad5d29ebf63d296222c25e9cb3b152ffb49ccab5c5e7a43cef5fef48330e833a55378859650a97499a6d11c4337e81dc89464a8ae1904c
-
C:\Users\Admin\AppData\Local\Temp\YuIejIluoJ\_Files\_SCREE~1.JPEMD5
b40b624057647d36ee50281c2b007b26
SHA19ec6ac0563f71b229bd191c5460fe462aaaef0eb
SHA25601ee50540b3f2f26ecd712d1eff62675576ac139a2220c12498318c40b0fdc14
SHA5128e6d572697081c20aad4ad29fe72d02c4cc267761145cb612fde03492cf0f09b069f569afd1f8656f3f5938d49915e7949402be6ee27bd06b4a7e022230f5057
-
C:\Users\Admin\AppData\Local\Temp\YuIejIluoJ\files_\SCREEN~1.JPGMD5
b40b624057647d36ee50281c2b007b26
SHA19ec6ac0563f71b229bd191c5460fe462aaaef0eb
SHA25601ee50540b3f2f26ecd712d1eff62675576ac139a2220c12498318c40b0fdc14
SHA5128e6d572697081c20aad4ad29fe72d02c4cc267761145cb612fde03492cf0f09b069f569afd1f8656f3f5938d49915e7949402be6ee27bd06b4a7e022230f5057
-
C:\Users\Admin\AppData\Local\Temp\YuIejIluoJ\files_\SYSTEM~1.TXTMD5
7c63b91119715c60ec69816dfc0f8d04
SHA180310b97915ab0ed962914cf69eca1355b36dffa
SHA256fc5c0d8d667f76f66bafa76ddf369a01d2476020a82ca54da2df6b6efe7743af
SHA512f78d9d89183fd09e34ad5d29ebf63d296222c25e9cb3b152ffb49ccab5c5e7a43cef5fef48330e833a55378859650a97499a6d11c4337e81dc89464a8ae1904c
-
C:\Users\Admin\AppData\Local\Temp\YuIejIluoJ\files_\_Chrome\DEFAUL~1.BINMD5
09500b419541e759ce53d87e324fe8fc
SHA14b882732508d2fc28536f8281c3b58777720c7da
SHA256f80e7db7d3a06c87f03f5d0a9c7ab592ef05bc4fa5a8ab65c318c8455bd94476
SHA51245e04f6283559638be00bffaf1a52a52a6998f835d5d40f756806a2323623074cb7ee9f802f4eba7d7523ccf3170f8986f89349ffbc1f2514ce25fdae0114fde
-
C:\Users\Admin\AppData\Local\Temp\YuIejIluoJ\files_\_Chrome\DEFAUL~1.DBMD5
b608d407fc15adea97c26936bc6f03f6
SHA1953e7420801c76393902c0d6bb56148947e41571
SHA256b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf
SHA512cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4
-
C:\Users\Admin\AppData\Local\Temp\YuIejIluoJ\files_\_Chrome\DEFAUL~2.DBMD5
055c8c5c47424f3c2e7a6fc2ee904032
SHA15952781d22cff35d94861fac25d89a39af6d0a87
SHA256531b3121bd59938df4933972344d936a67e75d8b1741807a8a51c898d185dd2a
SHA512c2772893695f49cb185add62c35284779b20d45adc01184f1912613fa8b2d70c8e785f0d7cfa3bfaf1d2d58e7cdc74f4304fd973a956601927719d6d370dd57a
-
C:\Users\Admin\AppData\Local\Temp\YuIejIluoJ\files_\_Chrome\DEFAUL~3.DBMD5
8ee018331e95a610680a789192a9d362
SHA1e1fba0ac3f3d8689acf6c2ee26afdfd0c8e02df9
SHA25694354ea6703c5ef5fa052aeb1d29715587d80300858ebc063a61c02b7e6e9575
SHA5124b89b5adc77641e497eda7db62a48fee7b4b8dda83bff637cac850645d31deb93aafee5afeb41390e07fd16505a63f418b6cb153a1d35777c483e2d6d3f783b4
-
C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exeMD5
13ec5227fe52bcf2fc8ca6b1dcc07641
SHA121a546771c1acdde48a8be21081ce0ae1e376bfb
SHA25660c546941d7f705156881e6776c482c50f133d54ba520436291695fd39bff8bb
SHA512bcd479d71b5f7a8a294d647f66ba2c7670c39270142bb86cf96a8ffb97a7d5dcefb654c29c926fd2f43917a7da9ca11215012e5a109aad6062ef9e9e65355928
-
C:\Users\Admin\AppData\Roaming\NCH Software\DrawPad\DpEditor.exeMD5
13ec5227fe52bcf2fc8ca6b1dcc07641
SHA121a546771c1acdde48a8be21081ce0ae1e376bfb
SHA25660c546941d7f705156881e6776c482c50f133d54ba520436291695fd39bff8bb
SHA512bcd479d71b5f7a8a294d647f66ba2c7670c39270142bb86cf96a8ffb97a7d5dcefb654c29c926fd2f43917a7da9ca11215012e5a109aad6062ef9e9e65355928
-
memory/380-119-0x0000000001230000-0x000000000191B000-memory.dmpFilesize
6.9MB
-
memory/380-118-0x0000000001230000-0x000000000191B000-memory.dmpFilesize
6.9MB
-
memory/380-117-0x0000000077570000-0x00000000776FE000-memory.dmpFilesize
1.6MB
-
memory/380-116-0x0000000001230000-0x000000000191B000-memory.dmpFilesize
6.9MB
-
memory/380-115-0x0000000001230000-0x000000000191B000-memory.dmpFilesize
6.9MB
-
memory/1052-123-0x0000000000000000-mapping.dmp
-
memory/1368-150-0x0000000000B50000-0x0000000001245000-memory.dmpFilesize
7.0MB
-
memory/1368-149-0x0000000000B50000-0x0000000001245000-memory.dmpFilesize
7.0MB
-
memory/1368-147-0x0000000077570000-0x00000000776FE000-memory.dmpFilesize
1.6MB
-
memory/1368-148-0x0000000000B50000-0x0000000001245000-memory.dmpFilesize
7.0MB
-
memory/1368-151-0x0000000000B50000-0x0000000001245000-memory.dmpFilesize
7.0MB
-
memory/1368-144-0x0000000000000000-mapping.dmp
-
memory/2972-131-0x0000000000360000-0x0000000000A55000-memory.dmpFilesize
7.0MB
-
memory/2972-140-0x0000000000360000-0x0000000000A55000-memory.dmpFilesize
7.0MB
-
memory/2972-139-0x0000000000360000-0x0000000000A55000-memory.dmpFilesize
7.0MB
-
memory/2972-138-0x0000000077570000-0x00000000776FE000-memory.dmpFilesize
1.6MB
-
memory/2972-120-0x0000000000000000-mapping.dmp
-
memory/2972-130-0x0000000000360000-0x0000000000A55000-memory.dmpFilesize
7.0MB
-
memory/3292-143-0x0000000000000000-mapping.dmp