Analysis
-
max time kernel
116s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
24-02-2022 07:07
Static task
static1
Behavioral task
behavioral1
Sample
2283ad65576252b5a4f007cffb8e5d24.exe
Resource
win7-en-20211208
General
-
Target
2283ad65576252b5a4f007cffb8e5d24.exe
-
Size
1.6MB
-
MD5
2283ad65576252b5a4f007cffb8e5d24
-
SHA1
b5e19334955cd572e8535063a7bd38dd6561d957
-
SHA256
60e6e0f067230326553fef06a25719c538bc8bd9c9a2de543adc3d846e121672
-
SHA512
99a837a916feca345bb1a0e103408df782dbaafc99377f6f5e0b720b0689da12d4b674dc79ee3afc19db406bc67691ee39c3d842101a2b061b874456d2e5582a
Malware Config
Extracted
cryptbot
brikwl42.top
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
2283ad65576252b5a4f007cffb8e5d24.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation 2283ad65576252b5a4f007cffb8e5d24.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
2283ad65576252b5a4f007cffb8e5d24.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2283ad65576252b5a4f007cffb8e5d24.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2283ad65576252b5a4f007cffb8e5d24.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4088 timeout.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
2283ad65576252b5a4f007cffb8e5d24.execmd.exedescription pid process target process PID 3340 wrote to memory of 3852 3340 2283ad65576252b5a4f007cffb8e5d24.exe cmd.exe PID 3340 wrote to memory of 3852 3340 2283ad65576252b5a4f007cffb8e5d24.exe cmd.exe PID 3340 wrote to memory of 3852 3340 2283ad65576252b5a4f007cffb8e5d24.exe cmd.exe PID 3852 wrote to memory of 4088 3852 cmd.exe timeout.exe PID 3852 wrote to memory of 4088 3852 cmd.exe timeout.exe PID 3852 wrote to memory of 4088 3852 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2283ad65576252b5a4f007cffb8e5d24.exe"C:\Users\Admin\AppData\Local\Temp\2283ad65576252b5a4f007cffb8e5d24.exe"1⤵
- Checks computer location settings
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\hamaXWHjG & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\2283ad65576252b5a4f007cffb8e5d24.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- Delays execution with timeout.exe
PID:4088
-
-