Analysis
-
max time kernel
148s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
26-02-2022 08:23
Static task
static1
Behavioral task
behavioral1
Sample
4d50f5e9e375f71ff3ac1e806c60a728.exe
Resource
win7-en-20211208
General
-
Target
4d50f5e9e375f71ff3ac1e806c60a728.exe
-
Size
2.6MB
-
MD5
4d50f5e9e375f71ff3ac1e806c60a728
-
SHA1
76c1a682a7661810b8a608cc91c67bfdd15933b5
-
SHA256
3678e658fdc8ef06809080bc210a3bce96157e1940fa9bd107759a448ff6b281
-
SHA512
9c8f5c3b3273ee7c9eb42af195d9fad98c1b2bfc8ea592e8e5c147cae082bd0609a5f31e7257721f68494ed205a02b4227870cec4e6934fa7868d5eead0bb770
Malware Config
Extracted
cryptbot
briymk62.top
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
4d50f5e9e375f71ff3ac1e806c60a728.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4d50f5e9e375f71ff3ac1e806c60a728.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4d50f5e9e375f71ff3ac1e806c60a728.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/memory/1428-133-0x0000000000360000-0x0000000000A49000-memory.dmp themida behavioral2/memory/1428-135-0x0000000000360000-0x0000000000A49000-memory.dmp themida behavioral2/memory/1428-136-0x0000000000360000-0x0000000000A49000-memory.dmp themida behavioral2/memory/1428-137-0x0000000000360000-0x0000000000A49000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
4d50f5e9e375f71ff3ac1e806c60a728.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4d50f5e9e375f71ff3ac1e806c60a728.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
4d50f5e9e375f71ff3ac1e806c60a728.exepid process 1428 4d50f5e9e375f71ff3ac1e806c60a728.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
4d50f5e9e375f71ff3ac1e806c60a728.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 4d50f5e9e375f71ff3ac1e806c60a728.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 4d50f5e9e375f71ff3ac1e806c60a728.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
4d50f5e9e375f71ff3ac1e806c60a728.exepid process 1428 4d50f5e9e375f71ff3ac1e806c60a728.exe 1428 4d50f5e9e375f71ff3ac1e806c60a728.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d50f5e9e375f71ff3ac1e806c60a728.exe"C:\Users\Admin\AppData\Local\Temp\4d50f5e9e375f71ff3ac1e806c60a728.exe"1⤵
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1428