Analysis
-
max time kernel
4294180s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
26-02-2022 08:23
Static task
static1
Behavioral task
behavioral1
Sample
7390d4b623389f2238b17b94e6de42d7.exe
Resource
win7-20220223-en
windows7_x64
0 signatures
0 seconds
General
-
Target
7390d4b623389f2238b17b94e6de42d7.exe
-
Size
744KB
-
MD5
7390d4b623389f2238b17b94e6de42d7
-
SHA1
5f49bfbad45dfa04f510abe85c5cf56c5ddadfb1
-
SHA256
a3790ffc270f68f6148736aaa154fc226ba600bdf5f07254998d17b8b4c99746
-
SHA512
22b74f1b62981cdaa2d072e03de916bc52bf8893c28b3b722c6bc3ec8ad75fbce785665714ed25bb67b40b6028e8cc77c8ea0f9176cc2f810a607e568e82b05e
Malware Config
Extracted
Family
cryptbot
C2
bridmz52.top
Signatures
-
Deletes itself 1 IoCs
pid Process 340 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7390d4b623389f2238b17b94e6de42d7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7390d4b623389f2238b17b94e6de42d7.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1260 timeout.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1784 wrote to memory of 340 1784 7390d4b623389f2238b17b94e6de42d7.exe 27 PID 1784 wrote to memory of 340 1784 7390d4b623389f2238b17b94e6de42d7.exe 27 PID 1784 wrote to memory of 340 1784 7390d4b623389f2238b17b94e6de42d7.exe 27 PID 1784 wrote to memory of 340 1784 7390d4b623389f2238b17b94e6de42d7.exe 27 PID 340 wrote to memory of 1260 340 cmd.exe 29 PID 340 wrote to memory of 1260 340 cmd.exe 29 PID 340 wrote to memory of 1260 340 cmd.exe 29 PID 340 wrote to memory of 1260 340 cmd.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\7390d4b623389f2238b17b94e6de42d7.exe"C:\Users\Admin\AppData\Local\Temp\7390d4b623389f2238b17b94e6de42d7.exe"1⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\OYOajHcgl & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\7390d4b623389f2238b17b94e6de42d7.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- Delays execution with timeout.exe
PID:1260
-
-