Analysis

  • max time kernel
    90s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    26-02-2022 08:23

General

  • Target

    7390d4b623389f2238b17b94e6de42d7.exe

  • Size

    744KB

  • MD5

    7390d4b623389f2238b17b94e6de42d7

  • SHA1

    5f49bfbad45dfa04f510abe85c5cf56c5ddadfb1

  • SHA256

    a3790ffc270f68f6148736aaa154fc226ba600bdf5f07254998d17b8b4c99746

  • SHA512

    22b74f1b62981cdaa2d072e03de916bc52bf8893c28b3b722c6bc3ec8ad75fbce785665714ed25bb67b40b6028e8cc77c8ea0f9176cc2f810a607e568e82b05e

Malware Config

Extracted

Family

cryptbot

C2

bridmz52.top

Signatures

  • CryptBot

    A C++ stealer distributed widely in bundle with other software.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7390d4b623389f2238b17b94e6de42d7.exe
    "C:\Users\Admin\AppData\Local\Temp\7390d4b623389f2238b17b94e6de42d7.exe"
    1⤵
    • Checks computer location settings
    • Checks processor information in registry
    • Suspicious use of WriteProcessMemory
    PID:2696
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\VTryJudxo & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\7390d4b623389f2238b17b94e6de42d7.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2032
      • C:\Windows\SysWOW64\timeout.exe
        timeout 4
        3⤵
        • Delays execution with timeout.exe
        PID:2972

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2696-130-0x00000000026B0000-0x0000000002710000-memory.dmp

    Filesize

    384KB

  • memory/2696-131-0x00000000038C0000-0x0000000003907000-memory.dmp

    Filesize

    284KB

  • memory/2696-138-0x0000000002AB0000-0x0000000002AB1000-memory.dmp

    Filesize

    4KB

  • memory/2696-137-0x0000000002AC0000-0x0000000002AC1000-memory.dmp

    Filesize

    4KB

  • memory/2696-139-0x0000000002B10000-0x0000000002B11000-memory.dmp

    Filesize

    4KB

  • memory/2696-140-0x0000000002AA0000-0x0000000002AA1000-memory.dmp

    Filesize

    4KB

  • memory/2696-141-0x0000000002B30000-0x0000000002B31000-memory.dmp

    Filesize

    4KB

  • memory/2696-142-0x0000000002AE0000-0x0000000002AE1000-memory.dmp

    Filesize

    4KB

  • memory/2696-143-0x0000000002B20000-0x0000000002B21000-memory.dmp

    Filesize

    4KB

  • memory/2696-145-0x00000000037D0000-0x00000000037D1000-memory.dmp

    Filesize

    4KB

  • memory/2696-144-0x0000000002B00000-0x0000000002B01000-memory.dmp

    Filesize

    4KB

  • memory/2696-146-0x00000000037C0000-0x00000000037C1000-memory.dmp

    Filesize

    4KB

  • memory/2696-147-0x00000000028A0000-0x00000000028A1000-memory.dmp

    Filesize

    4KB

  • memory/2696-148-0x0000000002890000-0x0000000002891000-memory.dmp

    Filesize

    4KB

  • memory/2696-150-0x00000000028C0000-0x00000000028C1000-memory.dmp

    Filesize

    4KB

  • memory/2696-151-0x0000000002870000-0x0000000002871000-memory.dmp

    Filesize

    4KB

  • memory/2696-149-0x00000000028F0000-0x00000000028F1000-memory.dmp

    Filesize

    4KB

  • memory/2696-152-0x0000000002910000-0x0000000002911000-memory.dmp

    Filesize

    4KB

  • memory/2696-153-0x0000000002A10000-0x0000000002A11000-memory.dmp

    Filesize

    4KB

  • memory/2696-154-0x0000000002A00000-0x0000000002A01000-memory.dmp

    Filesize

    4KB

  • memory/2696-155-0x0000000002A60000-0x0000000002A61000-memory.dmp

    Filesize

    4KB

  • memory/2696-156-0x00000000029F0000-0x00000000029F1000-memory.dmp

    Filesize

    4KB

  • memory/2696-158-0x0000000002A30000-0x0000000002A31000-memory.dmp

    Filesize

    4KB

  • memory/2696-157-0x0000000002A80000-0x0000000002A81000-memory.dmp

    Filesize

    4KB

  • memory/2696-160-0x0000000003870000-0x0000000003871000-memory.dmp

    Filesize

    4KB

  • memory/2696-159-0x0000000002A70000-0x0000000002A71000-memory.dmp

    Filesize

    4KB

  • memory/2696-162-0x0000000002B60000-0x0000000002B61000-memory.dmp

    Filesize

    4KB

  • memory/2696-161-0x0000000002B70000-0x0000000002B71000-memory.dmp

    Filesize

    4KB

  • memory/2696-164-0x0000000002B50000-0x0000000002B51000-memory.dmp

    Filesize

    4KB

  • memory/2696-163-0x0000000002BC0000-0x0000000002BC1000-memory.dmp

    Filesize

    4KB

  • memory/2696-166-0x0000000002B90000-0x0000000002B91000-memory.dmp

    Filesize

    4KB

  • memory/2696-165-0x0000000002BE0000-0x0000000002BE1000-memory.dmp

    Filesize

    4KB

  • memory/2696-167-0x0000000002BD0000-0x0000000002BD1000-memory.dmp

    Filesize

    4KB

  • memory/2696-168-0x0000000002B80000-0x0000000002B81000-memory.dmp

    Filesize

    4KB

  • memory/2696-169-0x0000000003840000-0x0000000003841000-memory.dmp

    Filesize

    4KB

  • memory/2696-171-0x0000000003820000-0x0000000003821000-memory.dmp

    Filesize

    4KB

  • memory/2696-170-0x0000000003830000-0x0000000003831000-memory.dmp

    Filesize

    4KB

  • memory/2696-172-0x0000000003810000-0x0000000003811000-memory.dmp

    Filesize

    4KB

  • memory/2696-173-0x00000000038C1000-0x00000000038F5000-memory.dmp

    Filesize

    208KB