Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
26-02-2022 08:23
Static task
static1
Behavioral task
behavioral1
Sample
59181336c7ed4b4152b83793f7ea9eae.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
59181336c7ed4b4152b83793f7ea9eae.exe
-
Size
735KB
-
MD5
59181336c7ed4b4152b83793f7ea9eae
-
SHA1
5d91e0530c6ca8fbb7a35bed48c9865a599d1838
-
SHA256
f90eb82d70118fb18f44f8ecb33682baf047ef857210c57a7016b8794e2a94cd
-
SHA512
a8c32e5d520698b8519310393501ed9bceb4ecb5cd4bec8d0aa2743cc425cbcb52d62730d46906c4c79294a9b4ef5ec64872fd95fdb24f5eb313f89ce0bac585
Malware Config
Extracted
Family
cryptbot
C2
bridmz52.top
Signatures
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1444 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
59181336c7ed4b4152b83793f7ea9eae.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 59181336c7ed4b4152b83793f7ea9eae.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 59181336c7ed4b4152b83793f7ea9eae.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2008 timeout.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
59181336c7ed4b4152b83793f7ea9eae.execmd.exedescription pid process target process PID 1532 wrote to memory of 1444 1532 59181336c7ed4b4152b83793f7ea9eae.exe cmd.exe PID 1532 wrote to memory of 1444 1532 59181336c7ed4b4152b83793f7ea9eae.exe cmd.exe PID 1532 wrote to memory of 1444 1532 59181336c7ed4b4152b83793f7ea9eae.exe cmd.exe PID 1532 wrote to memory of 1444 1532 59181336c7ed4b4152b83793f7ea9eae.exe cmd.exe PID 1444 wrote to memory of 2008 1444 cmd.exe timeout.exe PID 1444 wrote to memory of 2008 1444 cmd.exe timeout.exe PID 1444 wrote to memory of 2008 1444 cmd.exe timeout.exe PID 1444 wrote to memory of 2008 1444 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\59181336c7ed4b4152b83793f7ea9eae.exe"C:\Users\Admin\AppData\Local\Temp\59181336c7ed4b4152b83793f7ea9eae.exe"1⤵
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\CIvlbMrPWY & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\59181336c7ed4b4152b83793f7ea9eae.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- Delays execution with timeout.exe
PID:2008
-
-