Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
24-02-2022 07:07
Static task
static1
Behavioral task
behavioral1
Sample
2283ad65576252b5a4f007cffb8e5d24.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
2283ad65576252b5a4f007cffb8e5d24.exe
-
Size
1.6MB
-
MD5
2283ad65576252b5a4f007cffb8e5d24
-
SHA1
b5e19334955cd572e8535063a7bd38dd6561d957
-
SHA256
60e6e0f067230326553fef06a25719c538bc8bd9c9a2de543adc3d846e121672
-
SHA512
99a837a916feca345bb1a0e103408df782dbaafc99377f6f5e0b720b0689da12d4b674dc79ee3afc19db406bc67691ee39c3d842101a2b061b874456d2e5582a
Malware Config
Extracted
Family
cryptbot
C2
brikwl42.top
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1812 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
2283ad65576252b5a4f007cffb8e5d24.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2283ad65576252b5a4f007cffb8e5d24.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2283ad65576252b5a4f007cffb8e5d24.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 1084 timeout.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
2283ad65576252b5a4f007cffb8e5d24.execmd.exedescription pid process target process PID 1636 wrote to memory of 1812 1636 2283ad65576252b5a4f007cffb8e5d24.exe cmd.exe PID 1636 wrote to memory of 1812 1636 2283ad65576252b5a4f007cffb8e5d24.exe cmd.exe PID 1636 wrote to memory of 1812 1636 2283ad65576252b5a4f007cffb8e5d24.exe cmd.exe PID 1636 wrote to memory of 1812 1636 2283ad65576252b5a4f007cffb8e5d24.exe cmd.exe PID 1812 wrote to memory of 1084 1812 cmd.exe timeout.exe PID 1812 wrote to memory of 1084 1812 cmd.exe timeout.exe PID 1812 wrote to memory of 1084 1812 cmd.exe timeout.exe PID 1812 wrote to memory of 1084 1812 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2283ad65576252b5a4f007cffb8e5d24.exe"C:\Users\Admin\AppData\Local\Temp\2283ad65576252b5a4f007cffb8e5d24.exe"1⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\dTHsbyqsWi & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\2283ad65576252b5a4f007cffb8e5d24.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- Delays execution with timeout.exe
PID:1084
-
-