Analysis

  • max time kernel
    153s
  • max time network
    168s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    24-06-2022 22:54

General

  • Target

    869ac51c41c295b3d6dce7580280c8c352fa12c62821edf7bb60df3a27bc35e7.exe

  • Size

    8.4MB

  • MD5

    49b3b8bd7e48d8810bd487485d4f0d0f

  • SHA1

    02ab9044729cb319e1ef54bbb148ced5975315af

  • SHA256

    869ac51c41c295b3d6dce7580280c8c352fa12c62821edf7bb60df3a27bc35e7

  • SHA512

    5784bbc2faa1150f01f0ed0f07361ad1d9dd84e2a551f1ca78ce3835fc2c9fd77e9f0bea69cdb74c380efef6d4de2b3dba47893b1a968febf55bf78a53085ca3

Malware Config

Signatures

  • CryptBot

    A C++ stealer distributed widely in bundle with other software.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Checks BIOS information in registry 2 TTPs 6 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Themida packer 21 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of FindShellTrayWindow 13 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\869ac51c41c295b3d6dce7580280c8c352fa12c62821edf7bb60df3a27bc35e7.exe
    "C:\Users\Admin\AppData\Local\Temp\869ac51c41c295b3d6dce7580280c8c352fa12c62821edf7bb60df3a27bc35e7.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of WriteProcessMemory
    PID:1796
    • C:\ProgramData\Dcs\1_protected.exe
      C:\ProgramData\Dcs\1_protected.exe
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Suspicious use of FindShellTrayWindow
      PID:1112
    • C:\ProgramData\Dcs\2_protected.exe
      C:\ProgramData\Dcs\2_protected.exe
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Checks whether UAC is enabled
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Suspicious use of FindShellTrayWindow
      PID:2028

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

4
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

4
T1082

Collection

Data from Local System

2
T1005

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Dcs\1_protected.exe
    Filesize

    2.7MB

    MD5

    d585ed8a8c75d24dabdc9719188fb071

    SHA1

    6fb6b33fe93c6f18f1b1bf1211b3752ab15280a8

    SHA256

    4b0f91ba3f6e7b15fe33f868ff3cc03c5d6a44be8445b3082c54adc3cca94eee

    SHA512

    eb0c30483a565164edd5c3542712af4363229fdbed0d9a7afa04b7d8c04073a650a64869d39b8de272ac48bfa4082e0df7dfcbd1f8383c3f83dbc8b9eb92df1c

  • C:\ProgramData\Dcs\2_protected.exe
    Filesize

    2.8MB

    MD5

    61e89680f3693952f63bb60daac1dfb6

    SHA1

    db28117a57ac955a39ee2a1a38fb83760be2ad08

    SHA256

    f838fb3cc74b59d2a20e3ccaeaa035ede40a12a7c8eb6c33d366b104e57ddb91

    SHA512

    ab5c90ca6d2a133d47ec9a4acd58934fff60076aa6263488bee57264d43b59f9f586f55041bc53ee71e166cbb9927df04054042beccc47f1832ac4c840f9ceaa

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FJZU34PA\line[1].txt
    Filesize

    161B

    MD5

    b26465add1927d3a0d318f8a83fb603e

    SHA1

    72b1d6895160c6a58483583856bfb57d580abc9f

    SHA256

    79407f411759c49be519022a762862f09dd8439362785f37902bac62d93a047e

    SHA512

    914ab20fd6b55dbe9478fc3169e94ef14d76ffbfaab132280ae248ed516697624ac34bdc9219bc242dcedd29544e526c5c1cb58721f61d76b524e95c44d60a95

  • \ProgramData\Dcs\1_protected.exe
    Filesize

    2.7MB

    MD5

    d585ed8a8c75d24dabdc9719188fb071

    SHA1

    6fb6b33fe93c6f18f1b1bf1211b3752ab15280a8

    SHA256

    4b0f91ba3f6e7b15fe33f868ff3cc03c5d6a44be8445b3082c54adc3cca94eee

    SHA512

    eb0c30483a565164edd5c3542712af4363229fdbed0d9a7afa04b7d8c04073a650a64869d39b8de272ac48bfa4082e0df7dfcbd1f8383c3f83dbc8b9eb92df1c

  • \ProgramData\Dcs\2_protected.exe
    Filesize

    2.8MB

    MD5

    61e89680f3693952f63bb60daac1dfb6

    SHA1

    db28117a57ac955a39ee2a1a38fb83760be2ad08

    SHA256

    f838fb3cc74b59d2a20e3ccaeaa035ede40a12a7c8eb6c33d366b104e57ddb91

    SHA512

    ab5c90ca6d2a133d47ec9a4acd58934fff60076aa6263488bee57264d43b59f9f586f55041bc53ee71e166cbb9927df04054042beccc47f1832ac4c840f9ceaa

  • memory/1112-68-0x0000000000400000-0x0000000000AED000-memory.dmp
    Filesize

    6.9MB

  • memory/1112-70-0x0000000000400000-0x0000000000AED000-memory.dmp
    Filesize

    6.9MB

  • memory/1112-90-0x0000000073CF1000-0x0000000073CF3000-memory.dmp
    Filesize

    8KB

  • memory/1112-63-0x0000000000000000-mapping.dmp
  • memory/1112-95-0x0000000000400000-0x0000000000AED000-memory.dmp
    Filesize

    6.9MB

  • memory/1112-66-0x0000000000400000-0x0000000000AED000-memory.dmp
    Filesize

    6.9MB

  • memory/1112-67-0x0000000000400000-0x0000000000AED000-memory.dmp
    Filesize

    6.9MB

  • memory/1112-99-0x0000000077400000-0x0000000077580000-memory.dmp
    Filesize

    1.5MB

  • memory/1112-74-0x0000000077400000-0x0000000077580000-memory.dmp
    Filesize

    1.5MB

  • memory/1796-60-0x0000000000400000-0x00000000010EA000-memory.dmp
    Filesize

    12.9MB

  • memory/1796-57-0x0000000000400000-0x00000000010EA000-memory.dmp
    Filesize

    12.9MB

  • memory/1796-55-0x0000000000400000-0x00000000010EA000-memory.dmp
    Filesize

    12.9MB

  • memory/1796-100-0x00000000054B0000-0x0000000005BBA000-memory.dmp
    Filesize

    7.0MB

  • memory/1796-54-0x00000000753B1000-0x00000000753B3000-memory.dmp
    Filesize

    8KB

  • memory/1796-76-0x00000000054B0000-0x0000000005BBA000-memory.dmp
    Filesize

    7.0MB

  • memory/1796-58-0x0000000077400000-0x0000000077580000-memory.dmp
    Filesize

    1.5MB

  • memory/1796-59-0x0000000000400000-0x00000000010EA000-memory.dmp
    Filesize

    12.9MB

  • memory/1796-92-0x00000000054B0000-0x0000000005B9D000-memory.dmp
    Filesize

    6.9MB

  • memory/1796-62-0x00000000054B0000-0x0000000005B9D000-memory.dmp
    Filesize

    6.9MB

  • memory/2028-75-0x0000000000E00000-0x000000000150A000-memory.dmp
    Filesize

    7.0MB

  • memory/2028-84-0x0000000000E00000-0x000000000150A000-memory.dmp
    Filesize

    7.0MB

  • memory/2028-83-0x0000000000E00000-0x000000000150A000-memory.dmp
    Filesize

    7.0MB

  • memory/2028-85-0x0000000074021000-0x0000000074023000-memory.dmp
    Filesize

    8KB

  • memory/2028-86-0x0000000073E61000-0x0000000073E63000-memory.dmp
    Filesize

    8KB

  • memory/2028-82-0x0000000000E00000-0x000000000150A000-memory.dmp
    Filesize

    7.0MB

  • memory/2028-81-0x0000000000E00000-0x000000000150A000-memory.dmp
    Filesize

    7.0MB

  • memory/2028-80-0x0000000077400000-0x0000000077580000-memory.dmp
    Filesize

    1.5MB

  • memory/2028-78-0x0000000000E00000-0x000000000150A000-memory.dmp
    Filesize

    7.0MB

  • memory/2028-79-0x0000000000E00000-0x000000000150A000-memory.dmp
    Filesize

    7.0MB

  • memory/2028-71-0x0000000000000000-mapping.dmp
  • memory/2028-101-0x0000000000E00000-0x000000000150A000-memory.dmp
    Filesize

    7.0MB

  • memory/2028-102-0x0000000077400000-0x0000000077580000-memory.dmp
    Filesize

    1.5MB