Analysis

  • max time kernel
    117s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    24-02-2022 18:09

General

  • Target

    9f9b4a29bff765b3a6c79737f4471268.exe

  • Size

    698KB

  • MD5

    9f9b4a29bff765b3a6c79737f4471268

  • SHA1

    ac6dd5c92e07bf2057dacf5b15cace59b2d0f88e

  • SHA256

    161ce807aa141a328eeb24bdc91264071ab2dddf6184c974dabf86ad91b0a77e

  • SHA512

    67c83d686ca2da124877fbb31e953be80363ecf27e0dc29093f3bf6259b2ca41800223b23a8d13b87f1d8df6fe9d47ada6748be8cdaff602cffa0a8461d487bb

Malware Config

Extracted

Family

cryptbot

C2

brikwl42.top

Signatures

  • CryptBot

    A C++ stealer distributed widely in bundle with other software.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9f9b4a29bff765b3a6c79737f4471268.exe
    "C:\Users\Admin\AppData\Local\Temp\9f9b4a29bff765b3a6c79737f4471268.exe"
    1⤵
    • Checks computer location settings
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:3756
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\iIYHvrrq & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\9f9b4a29bff765b3a6c79737f4471268.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3320
      • C:\Windows\SysWOW64\timeout.exe
        timeout 4
        3⤵
        • Delays execution with timeout.exe
        PID:1896

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3756-130-0x00000000007C0000-0x0000000000820000-memory.dmp
    Filesize

    384KB

  • memory/3756-132-0x0000000002AA0000-0x0000000002AA1000-memory.dmp
    Filesize

    4KB

  • memory/3756-131-0x0000000002AB0000-0x0000000002AB1000-memory.dmp
    Filesize

    4KB

  • memory/3756-133-0x0000000002B00000-0x0000000002B01000-memory.dmp
    Filesize

    4KB

  • memory/3756-134-0x0000000002A90000-0x0000000002A91000-memory.dmp
    Filesize

    4KB

  • memory/3756-135-0x0000000002B20000-0x0000000002B21000-memory.dmp
    Filesize

    4KB

  • memory/3756-136-0x0000000002AD0000-0x0000000002AD1000-memory.dmp
    Filesize

    4KB

  • memory/3756-137-0x0000000002B10000-0x0000000002B11000-memory.dmp
    Filesize

    4KB

  • memory/3756-138-0x0000000002AF0000-0x0000000002AF1000-memory.dmp
    Filesize

    4KB

  • memory/3756-139-0x00000000037C0000-0x00000000037C1000-memory.dmp
    Filesize

    4KB

  • memory/3756-148-0x00000000029F0000-0x00000000029F1000-memory.dmp
    Filesize

    4KB

  • memory/3756-147-0x0000000002A00000-0x0000000002A01000-memory.dmp
    Filesize

    4KB

  • memory/3756-150-0x00000000029E0000-0x00000000029E1000-memory.dmp
    Filesize

    4KB

  • memory/3756-149-0x0000000002A50000-0x0000000002A51000-memory.dmp
    Filesize

    4KB

  • memory/3756-146-0x00000000028F0000-0x00000000028F1000-memory.dmp
    Filesize

    4KB

  • memory/3756-145-0x00000000008B0000-0x00000000008B1000-memory.dmp
    Filesize

    4KB

  • memory/3756-144-0x00000000028B0000-0x00000000028B1000-memory.dmp
    Filesize

    4KB

  • memory/3756-143-0x00000000028E0000-0x00000000028E1000-memory.dmp
    Filesize

    4KB

  • memory/3756-142-0x00000000008C0000-0x00000000008C1000-memory.dmp
    Filesize

    4KB

  • memory/3756-141-0x0000000002880000-0x0000000002881000-memory.dmp
    Filesize

    4KB

  • memory/3756-140-0x00000000037B0000-0x00000000037B1000-memory.dmp
    Filesize

    4KB

  • memory/3756-151-0x0000000002A70000-0x0000000002A71000-memory.dmp
    Filesize

    4KB

  • memory/3756-152-0x0000000002A20000-0x0000000002A21000-memory.dmp
    Filesize

    4KB

  • memory/3756-153-0x0000000002A60000-0x0000000002A61000-memory.dmp
    Filesize

    4KB

  • memory/3756-154-0x0000000003860000-0x0000000003861000-memory.dmp
    Filesize

    4KB

  • memory/3756-156-0x0000000002B50000-0x0000000002B51000-memory.dmp
    Filesize

    4KB

  • memory/3756-155-0x0000000002B60000-0x0000000002B61000-memory.dmp
    Filesize

    4KB

  • memory/3756-157-0x0000000002BB0000-0x0000000002BB1000-memory.dmp
    Filesize

    4KB

  • memory/3756-159-0x0000000002BD0000-0x0000000002BD1000-memory.dmp
    Filesize

    4KB

  • memory/3756-158-0x0000000002B40000-0x0000000002B41000-memory.dmp
    Filesize

    4KB

  • memory/3756-160-0x0000000002B80000-0x0000000002B81000-memory.dmp
    Filesize

    4KB

  • memory/3756-161-0x0000000002BC0000-0x0000000002BC1000-memory.dmp
    Filesize

    4KB

  • memory/3756-162-0x0000000002B70000-0x0000000002B71000-memory.dmp
    Filesize

    4KB

  • memory/3756-163-0x0000000003830000-0x0000000003831000-memory.dmp
    Filesize

    4KB

  • memory/3756-164-0x0000000003820000-0x0000000003821000-memory.dmp
    Filesize

    4KB

  • memory/3756-165-0x00000000038B0000-0x00000000038F7000-memory.dmp
    Filesize

    284KB

  • memory/3756-172-0x0000000003800000-0x0000000003801000-memory.dmp
    Filesize

    4KB

  • memory/3756-171-0x0000000003810000-0x0000000003811000-memory.dmp
    Filesize

    4KB

  • memory/3756-173-0x00000000038B1000-0x00000000038E5000-memory.dmp
    Filesize

    208KB