Analysis
-
max time kernel
122s -
max time network
132s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
15-02-2022 15:49
Static task
static1
Behavioral task
behavioral1
Sample
08e9f16a456c604e7cba97d5715fcc119d236e621a4daa05bf2095ebd86db0b3.exe
Resource
win7-en-20211208
General
-
Target
08e9f16a456c604e7cba97d5715fcc119d236e621a4daa05bf2095ebd86db0b3.exe
-
Size
2.8MB
-
MD5
112ec56110d36baba5b9e1ae46e171aa
-
SHA1
50bfa9adfb24d913fc5607ac762e8a9907b1fe68
-
SHA256
08e9f16a456c604e7cba97d5715fcc119d236e621a4daa05bf2095ebd86db0b3
-
SHA512
c8d19fb284f33e6859679c31bad90828be37ea9a83577efa63033fc781a11e2a5bf3d76f07bf6192c014795f968997dad0d68aac13f88403a7cfc21a0abb3abd
Malware Config
Extracted
cryptbot
nob3m.top
nob3e.top
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
08e9f16a456c604e7cba97d5715fcc119d236e621a4daa05bf2095ebd86db0b3.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 08e9f16a456c604e7cba97d5715fcc119d236e621a4daa05bf2095ebd86db0b3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 08e9f16a456c604e7cba97d5715fcc119d236e621a4daa05bf2095ebd86db0b3.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 520 cmd.exe -
Processes:
resource yara_rule behavioral1/memory/1580-55-0x00000000003A0000-0x0000000000AE2000-memory.dmp themida behavioral1/memory/1580-57-0x00000000003A0000-0x0000000000AE2000-memory.dmp themida behavioral1/memory/1580-58-0x00000000003A0000-0x0000000000AE2000-memory.dmp themida behavioral1/memory/1580-59-0x00000000003A0000-0x0000000000AE2000-memory.dmp themida -
Processes:
08e9f16a456c604e7cba97d5715fcc119d236e621a4daa05bf2095ebd86db0b3.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 08e9f16a456c604e7cba97d5715fcc119d236e621a4daa05bf2095ebd86db0b3.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
08e9f16a456c604e7cba97d5715fcc119d236e621a4daa05bf2095ebd86db0b3.exepid process 1580 08e9f16a456c604e7cba97d5715fcc119d236e621a4daa05bf2095ebd86db0b3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
08e9f16a456c604e7cba97d5715fcc119d236e621a4daa05bf2095ebd86db0b3.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 08e9f16a456c604e7cba97d5715fcc119d236e621a4daa05bf2095ebd86db0b3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 08e9f16a456c604e7cba97d5715fcc119d236e621a4daa05bf2095ebd86db0b3.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 760 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
08e9f16a456c604e7cba97d5715fcc119d236e621a4daa05bf2095ebd86db0b3.exepid process 1580 08e9f16a456c604e7cba97d5715fcc119d236e621a4daa05bf2095ebd86db0b3.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
08e9f16a456c604e7cba97d5715fcc119d236e621a4daa05bf2095ebd86db0b3.execmd.exedescription pid process target process PID 1580 wrote to memory of 520 1580 08e9f16a456c604e7cba97d5715fcc119d236e621a4daa05bf2095ebd86db0b3.exe cmd.exe PID 1580 wrote to memory of 520 1580 08e9f16a456c604e7cba97d5715fcc119d236e621a4daa05bf2095ebd86db0b3.exe cmd.exe PID 1580 wrote to memory of 520 1580 08e9f16a456c604e7cba97d5715fcc119d236e621a4daa05bf2095ebd86db0b3.exe cmd.exe PID 1580 wrote to memory of 520 1580 08e9f16a456c604e7cba97d5715fcc119d236e621a4daa05bf2095ebd86db0b3.exe cmd.exe PID 520 wrote to memory of 760 520 cmd.exe timeout.exe PID 520 wrote to memory of 760 520 cmd.exe timeout.exe PID 520 wrote to memory of 760 520 cmd.exe timeout.exe PID 520 wrote to memory of 760 520 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\08e9f16a456c604e7cba97d5715fcc119d236e621a4daa05bf2095ebd86db0b3.exe"C:\Users\Admin\AppData\Local\Temp\08e9f16a456c604e7cba97d5715fcc119d236e621a4daa05bf2095ebd86db0b3.exe"1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\pHyNFeyaO & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\08e9f16a456c604e7cba97d5715fcc119d236e621a4daa05bf2095ebd86db0b3.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- Delays execution with timeout.exe
PID:760