Analysis

  • max time kernel
    116s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    24-02-2022 07:07

General

  • Target

    2283ad65576252b5a4f007cffb8e5d24.exe

  • Size

    1.6MB

  • MD5

    2283ad65576252b5a4f007cffb8e5d24

  • SHA1

    b5e19334955cd572e8535063a7bd38dd6561d957

  • SHA256

    60e6e0f067230326553fef06a25719c538bc8bd9c9a2de543adc3d846e121672

  • SHA512

    99a837a916feca345bb1a0e103408df782dbaafc99377f6f5e0b720b0689da12d4b674dc79ee3afc19db406bc67691ee39c3d842101a2b061b874456d2e5582a

Malware Config

Extracted

Family

cryptbot

C2

brikwl42.top

Signatures

  • CryptBot

    A C++ stealer distributed widely in bundle with other software.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2283ad65576252b5a4f007cffb8e5d24.exe
    "C:\Users\Admin\AppData\Local\Temp\2283ad65576252b5a4f007cffb8e5d24.exe"
    1⤵
    • Checks computer location settings
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:3340
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\hamaXWHjG & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\2283ad65576252b5a4f007cffb8e5d24.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3852
      • C:\Windows\SysWOW64\timeout.exe
        timeout 4
        3⤵
        • Delays execution with timeout.exe
        PID:4088

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3340-131-0x0000000002B90000-0x0000000002B91000-memory.dmp
    Filesize

    4KB

  • memory/3340-130-0x00000000008B0000-0x0000000000910000-memory.dmp
    Filesize

    384KB

  • memory/3340-133-0x0000000002BE0000-0x0000000002BE1000-memory.dmp
    Filesize

    4KB

  • memory/3340-132-0x0000000002B80000-0x0000000002B81000-memory.dmp
    Filesize

    4KB

  • memory/3340-134-0x0000000002B70000-0x0000000002B71000-memory.dmp
    Filesize

    4KB

  • memory/3340-135-0x0000000002C00000-0x0000000002C01000-memory.dmp
    Filesize

    4KB

  • memory/3340-136-0x0000000002BB0000-0x0000000002BB1000-memory.dmp
    Filesize

    4KB

  • memory/3340-137-0x0000000002BF0000-0x0000000002BF1000-memory.dmp
    Filesize

    4KB

  • memory/3340-138-0x0000000002BD0000-0x0000000002BD1000-memory.dmp
    Filesize

    4KB

  • memory/3340-139-0x00000000038A0000-0x00000000038A1000-memory.dmp
    Filesize

    4KB

  • memory/3340-141-0x0000000002970000-0x0000000002971000-memory.dmp
    Filesize

    4KB

  • memory/3340-140-0x0000000003890000-0x0000000003891000-memory.dmp
    Filesize

    4KB

  • memory/3340-143-0x00000000029D0000-0x00000000029D1000-memory.dmp
    Filesize

    4KB

  • memory/3340-142-0x0000000002960000-0x0000000002961000-memory.dmp
    Filesize

    4KB

  • memory/3340-144-0x0000000002990000-0x0000000002991000-memory.dmp
    Filesize

    4KB

  • memory/3340-145-0x0000000002950000-0x0000000002951000-memory.dmp
    Filesize

    4KB

  • memory/3340-147-0x0000000002AE0000-0x0000000002AE1000-memory.dmp
    Filesize

    4KB

  • memory/3340-146-0x00000000029E0000-0x00000000029E1000-memory.dmp
    Filesize

    4KB

  • memory/3340-148-0x0000000002AD0000-0x0000000002AD1000-memory.dmp
    Filesize

    4KB

  • memory/3340-149-0x0000000002B30000-0x0000000002B31000-memory.dmp
    Filesize

    4KB

  • memory/3340-150-0x0000000002AC0000-0x0000000002AC1000-memory.dmp
    Filesize

    4KB

  • memory/3340-151-0x0000000002B50000-0x0000000002B51000-memory.dmp
    Filesize

    4KB

  • memory/3340-153-0x0000000002B40000-0x0000000002B41000-memory.dmp
    Filesize

    4KB

  • memory/3340-152-0x0000000002B00000-0x0000000002B01000-memory.dmp
    Filesize

    4KB

  • memory/3340-154-0x0000000003940000-0x0000000003941000-memory.dmp
    Filesize

    4KB

  • memory/3340-156-0x0000000002C30000-0x0000000002C31000-memory.dmp
    Filesize

    4KB

  • memory/3340-155-0x0000000002C40000-0x0000000002C41000-memory.dmp
    Filesize

    4KB

  • memory/3340-157-0x0000000002C90000-0x0000000002C91000-memory.dmp
    Filesize

    4KB

  • memory/3340-158-0x0000000002C20000-0x0000000002C21000-memory.dmp
    Filesize

    4KB

  • memory/3340-159-0x0000000002CB0000-0x0000000002CB1000-memory.dmp
    Filesize

    4KB

  • memory/3340-160-0x0000000002C60000-0x0000000002C61000-memory.dmp
    Filesize

    4KB

  • memory/3340-161-0x0000000002CA0000-0x0000000002CA1000-memory.dmp
    Filesize

    4KB

  • memory/3340-162-0x0000000002C50000-0x0000000002C51000-memory.dmp
    Filesize

    4KB

  • memory/3340-163-0x0000000003910000-0x0000000003911000-memory.dmp
    Filesize

    4KB

  • memory/3340-164-0x0000000003900000-0x0000000003901000-memory.dmp
    Filesize

    4KB

  • memory/3340-165-0x0000000003990000-0x00000000039D7000-memory.dmp
    Filesize

    284KB

  • memory/3340-172-0x00000000038E0000-0x00000000038E1000-memory.dmp
    Filesize

    4KB

  • memory/3340-171-0x00000000038F0000-0x00000000038F1000-memory.dmp
    Filesize

    4KB

  • memory/3340-173-0x0000000003991000-0x00000000039C5000-memory.dmp
    Filesize

    208KB