Analysis
-
max time kernel
90s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
26-02-2022 08:23
Static task
static1
Behavioral task
behavioral1
Sample
7390d4b623389f2238b17b94e6de42d7.exe
Resource
win7-20220223-en
windows7_x64
0 signatures
0 seconds
General
-
Target
7390d4b623389f2238b17b94e6de42d7.exe
-
Size
744KB
-
MD5
7390d4b623389f2238b17b94e6de42d7
-
SHA1
5f49bfbad45dfa04f510abe85c5cf56c5ddadfb1
-
SHA256
a3790ffc270f68f6148736aaa154fc226ba600bdf5f07254998d17b8b4c99746
-
SHA512
22b74f1b62981cdaa2d072e03de916bc52bf8893c28b3b722c6bc3ec8ad75fbce785665714ed25bb67b40b6028e8cc77c8ea0f9176cc2f810a607e568e82b05e
Malware Config
Extracted
Family
cryptbot
C2
bridmz52.top
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation 7390d4b623389f2238b17b94e6de42d7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7390d4b623389f2238b17b94e6de42d7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7390d4b623389f2238b17b94e6de42d7.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2972 timeout.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2032 2696 7390d4b623389f2238b17b94e6de42d7.exe 59 PID 2696 wrote to memory of 2032 2696 7390d4b623389f2238b17b94e6de42d7.exe 59 PID 2696 wrote to memory of 2032 2696 7390d4b623389f2238b17b94e6de42d7.exe 59 PID 2032 wrote to memory of 2972 2032 cmd.exe 61 PID 2032 wrote to memory of 2972 2032 cmd.exe 61 PID 2032 wrote to memory of 2972 2032 cmd.exe 61
Processes
-
C:\Users\Admin\AppData\Local\Temp\7390d4b623389f2238b17b94e6de42d7.exe"C:\Users\Admin\AppData\Local\Temp\7390d4b623389f2238b17b94e6de42d7.exe"1⤵
- Checks computer location settings
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\VTryJudxo & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\7390d4b623389f2238b17b94e6de42d7.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- Delays execution with timeout.exe
PID:2972
-
-