Analysis
-
max time kernel
123s -
max time network
132s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
26-02-2022 08:23
Static task
static1
Behavioral task
behavioral1
Sample
4d50f5e9e375f71ff3ac1e806c60a728.exe
Resource
win7-en-20211208
General
-
Target
4d50f5e9e375f71ff3ac1e806c60a728.exe
-
Size
2.6MB
-
MD5
4d50f5e9e375f71ff3ac1e806c60a728
-
SHA1
76c1a682a7661810b8a608cc91c67bfdd15933b5
-
SHA256
3678e658fdc8ef06809080bc210a3bce96157e1940fa9bd107759a448ff6b281
-
SHA512
9c8f5c3b3273ee7c9eb42af195d9fad98c1b2bfc8ea592e8e5c147cae082bd0609a5f31e7257721f68494ed205a02b4227870cec4e6934fa7868d5eead0bb770
Malware Config
Extracted
cryptbot
briymk62.top
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
4d50f5e9e375f71ff3ac1e806c60a728.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4d50f5e9e375f71ff3ac1e806c60a728.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4d50f5e9e375f71ff3ac1e806c60a728.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 972 cmd.exe -
Processes:
resource yara_rule behavioral1/memory/1588-56-0x0000000001070000-0x0000000001759000-memory.dmp themida behavioral1/memory/1588-57-0x0000000001070000-0x0000000001759000-memory.dmp themida behavioral1/memory/1588-59-0x0000000001070000-0x0000000001759000-memory.dmp themida behavioral1/memory/1588-60-0x0000000001070000-0x0000000001759000-memory.dmp themida -
Processes:
4d50f5e9e375f71ff3ac1e806c60a728.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4d50f5e9e375f71ff3ac1e806c60a728.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
4d50f5e9e375f71ff3ac1e806c60a728.exepid process 1588 4d50f5e9e375f71ff3ac1e806c60a728.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
4d50f5e9e375f71ff3ac1e806c60a728.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 4d50f5e9e375f71ff3ac1e806c60a728.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 4d50f5e9e375f71ff3ac1e806c60a728.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 564 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
4d50f5e9e375f71ff3ac1e806c60a728.exepid process 1588 4d50f5e9e375f71ff3ac1e806c60a728.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
4d50f5e9e375f71ff3ac1e806c60a728.execmd.exedescription pid process target process PID 1588 wrote to memory of 972 1588 4d50f5e9e375f71ff3ac1e806c60a728.exe cmd.exe PID 1588 wrote to memory of 972 1588 4d50f5e9e375f71ff3ac1e806c60a728.exe cmd.exe PID 1588 wrote to memory of 972 1588 4d50f5e9e375f71ff3ac1e806c60a728.exe cmd.exe PID 1588 wrote to memory of 972 1588 4d50f5e9e375f71ff3ac1e806c60a728.exe cmd.exe PID 972 wrote to memory of 564 972 cmd.exe timeout.exe PID 972 wrote to memory of 564 972 cmd.exe timeout.exe PID 972 wrote to memory of 564 972 cmd.exe timeout.exe PID 972 wrote to memory of 564 972 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d50f5e9e375f71ff3ac1e806c60a728.exe"C:\Users\Admin\AppData\Local\Temp\4d50f5e9e375f71ff3ac1e806c60a728.exe"1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\CIvlbMrPWY & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\4d50f5e9e375f71ff3ac1e806c60a728.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- Delays execution with timeout.exe
PID:564
-
-