Analysis

  • max time kernel
    147s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-20220715-en
  • submitted
    31-07-2022 08:50

General

  • Target

    9605231b3632e8fd98ec70b4a1e1d2192689e4a4abc2df62c955c25e40bfe3e4.exe

  • Size

    4.1MB

  • MD5

    00f6d577255aeba6ef07654f829a945e

  • SHA1

    6a1983afed3140a083c2417c716d427ac9649e4e

  • SHA256

    9605231b3632e8fd98ec70b4a1e1d2192689e4a4abc2df62c955c25e40bfe3e4

  • SHA512

    e1d611b76c7a1b0ca10603cccb1c3f87abd05354e4a9d3e194586f56109202693607525fcc44ca639f778538422d4bef7c91b5e1b31986a7fc01e1abf51f6655

  • SSDEEP

    98304:wbNDO9MRv3n6wx02rPkC3St5fqiyUCQ0yUL05Rx:wZD1v3K1sSfX1iG

Malware Config

Extracted

Family

cryptbot

C2

hio01.pro

Signatures

  • CryptBot

    A C++ stealer distributed widely in bundle with other software.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 12 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9605231b3632e8fd98ec70b4a1e1d2192689e4a4abc2df62c955c25e40bfe3e4.exe
    "C:\Users\Admin\AppData\Local\Temp\9605231b3632e8fd98ec70b4a1e1d2192689e4a4abc2df62c955c25e40bfe3e4.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:912
    • C:\Program Files (x86)\Hps\Set.exe
      "C:\Program Files (x86)\Hps\Set.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      PID:2036
    • C:\Program Files (x86)\Hps\Setup.exe
      "C:\Program Files (x86)\Hps\Setup.exe"
      2⤵
      • Identifies VirtualBox via ACPI registry values (likely anti-VM)
      • Executes dropped EXE
      • Checks BIOS information in registry
      • Identifies Wine through registry keys
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      PID:1120

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Hps\Set.exe

    Filesize

    2.0MB

    MD5

    dc4dfdd359b8c6f5ba0e7a444b1dce25

    SHA1

    3402de0f455a075668e89614dcb74effef698b87

    SHA256

    80b33ef5167ed621606f36aabbe93a01b35949544b826ee12380cb0474468cfc

    SHA512

    3582f382d544482ee88bb3ae82e7fe2da6ea0a22becf54c45f886c272b7dbdc8a5ea393c00349ee5bce23d1607118ad0c24ccad55e33399920f11c5156090b9f

  • C:\Program Files (x86)\Hps\Set.exe

    Filesize

    2.0MB

    MD5

    dc4dfdd359b8c6f5ba0e7a444b1dce25

    SHA1

    3402de0f455a075668e89614dcb74effef698b87

    SHA256

    80b33ef5167ed621606f36aabbe93a01b35949544b826ee12380cb0474468cfc

    SHA512

    3582f382d544482ee88bb3ae82e7fe2da6ea0a22becf54c45f886c272b7dbdc8a5ea393c00349ee5bce23d1607118ad0c24ccad55e33399920f11c5156090b9f

  • C:\Program Files (x86)\Hps\Setup.exe

    Filesize

    2.2MB

    MD5

    a2553f8709f3251f84f882afd04e5922

    SHA1

    1b6c85df29adf36a916474ba4e31482dcefeab80

    SHA256

    eccbaa183f83e02a7681fd3669717ecf7498b0298d0dca9d55937ca2e9097c42

    SHA512

    9f1d3e3520597a407f42271b8624a0d812574ecd019bb01b9b76f3d2c890038f8e3b867683b521f213838977815656d7f09809ba4faf949b907adafc512dc9fb

  • C:\Program Files (x86)\Hps\Setup.exe

    Filesize

    2.2MB

    MD5

    a2553f8709f3251f84f882afd04e5922

    SHA1

    1b6c85df29adf36a916474ba4e31482dcefeab80

    SHA256

    eccbaa183f83e02a7681fd3669717ecf7498b0298d0dca9d55937ca2e9097c42

    SHA512

    9f1d3e3520597a407f42271b8624a0d812574ecd019bb01b9b76f3d2c890038f8e3b867683b521f213838977815656d7f09809ba4faf949b907adafc512dc9fb

  • \Program Files (x86)\Hps\Set.exe

    Filesize

    2.0MB

    MD5

    dc4dfdd359b8c6f5ba0e7a444b1dce25

    SHA1

    3402de0f455a075668e89614dcb74effef698b87

    SHA256

    80b33ef5167ed621606f36aabbe93a01b35949544b826ee12380cb0474468cfc

    SHA512

    3582f382d544482ee88bb3ae82e7fe2da6ea0a22becf54c45f886c272b7dbdc8a5ea393c00349ee5bce23d1607118ad0c24ccad55e33399920f11c5156090b9f

  • \Program Files (x86)\Hps\Set.exe

    Filesize

    2.0MB

    MD5

    dc4dfdd359b8c6f5ba0e7a444b1dce25

    SHA1

    3402de0f455a075668e89614dcb74effef698b87

    SHA256

    80b33ef5167ed621606f36aabbe93a01b35949544b826ee12380cb0474468cfc

    SHA512

    3582f382d544482ee88bb3ae82e7fe2da6ea0a22becf54c45f886c272b7dbdc8a5ea393c00349ee5bce23d1607118ad0c24ccad55e33399920f11c5156090b9f

  • \Program Files (x86)\Hps\Set.exe

    Filesize

    2.0MB

    MD5

    dc4dfdd359b8c6f5ba0e7a444b1dce25

    SHA1

    3402de0f455a075668e89614dcb74effef698b87

    SHA256

    80b33ef5167ed621606f36aabbe93a01b35949544b826ee12380cb0474468cfc

    SHA512

    3582f382d544482ee88bb3ae82e7fe2da6ea0a22becf54c45f886c272b7dbdc8a5ea393c00349ee5bce23d1607118ad0c24ccad55e33399920f11c5156090b9f

  • \Program Files (x86)\Hps\Setup.exe

    Filesize

    2.2MB

    MD5

    a2553f8709f3251f84f882afd04e5922

    SHA1

    1b6c85df29adf36a916474ba4e31482dcefeab80

    SHA256

    eccbaa183f83e02a7681fd3669717ecf7498b0298d0dca9d55937ca2e9097c42

    SHA512

    9f1d3e3520597a407f42271b8624a0d812574ecd019bb01b9b76f3d2c890038f8e3b867683b521f213838977815656d7f09809ba4faf949b907adafc512dc9fb

  • \Program Files (x86)\Hps\Setup.exe

    Filesize

    2.2MB

    MD5

    a2553f8709f3251f84f882afd04e5922

    SHA1

    1b6c85df29adf36a916474ba4e31482dcefeab80

    SHA256

    eccbaa183f83e02a7681fd3669717ecf7498b0298d0dca9d55937ca2e9097c42

    SHA512

    9f1d3e3520597a407f42271b8624a0d812574ecd019bb01b9b76f3d2c890038f8e3b867683b521f213838977815656d7f09809ba4faf949b907adafc512dc9fb

  • \Program Files (x86)\Hps\Setup.exe

    Filesize

    2.2MB

    MD5

    a2553f8709f3251f84f882afd04e5922

    SHA1

    1b6c85df29adf36a916474ba4e31482dcefeab80

    SHA256

    eccbaa183f83e02a7681fd3669717ecf7498b0298d0dca9d55937ca2e9097c42

    SHA512

    9f1d3e3520597a407f42271b8624a0d812574ecd019bb01b9b76f3d2c890038f8e3b867683b521f213838977815656d7f09809ba4faf949b907adafc512dc9fb

  • \Users\Admin\AppData\Local\Temp\nsiFC89.tmp\UAC.dll

    Filesize

    14KB

    MD5

    adb29e6b186daa765dc750128649b63d

    SHA1

    160cbdc4cb0ac2c142d361df138c537aa7e708c9

    SHA256

    2f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08

    SHA512

    b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada

  • memory/912-82-0x0000000002740000-0x0000000002C84000-memory.dmp

    Filesize

    5.3MB

  • memory/912-54-0x0000000074DB1000-0x0000000074DB3000-memory.dmp

    Filesize

    8KB

  • memory/912-99-0x0000000002740000-0x0000000002C84000-memory.dmp

    Filesize

    5.3MB

  • memory/912-58-0x0000000002740000-0x0000000002C50000-memory.dmp

    Filesize

    5.1MB

  • memory/1120-100-0x0000000000940000-0x0000000000E84000-memory.dmp

    Filesize

    5.3MB

  • memory/1120-87-0x0000000000940000-0x0000000000E84000-memory.dmp

    Filesize

    5.3MB

  • memory/1120-86-0x0000000000FC0000-0x0000000001504000-memory.dmp

    Filesize

    5.3MB

  • memory/1120-85-0x0000000073B01000-0x0000000073B03000-memory.dmp

    Filesize

    8KB

  • memory/1120-83-0x0000000000940000-0x0000000000E84000-memory.dmp

    Filesize

    5.3MB

  • memory/1120-88-0x0000000073901000-0x0000000073903000-memory.dmp

    Filesize

    8KB

  • memory/1120-76-0x0000000000000000-mapping.dmp

  • memory/1120-98-0x00000000737A1000-0x00000000737A3000-memory.dmp

    Filesize

    8KB

  • memory/1120-84-0x0000000000FC0000-0x0000000001504000-memory.dmp

    Filesize

    5.3MB

  • memory/1120-101-0x0000000000FC0000-0x0000000001504000-memory.dmp

    Filesize

    5.3MB

  • memory/1120-102-0x0000000000FC0000-0x0000000001504000-memory.dmp

    Filesize

    5.3MB

  • memory/1120-103-0x0000000000940000-0x0000000000E84000-memory.dmp

    Filesize

    5.3MB

  • memory/2036-64-0x0000000000400000-0x0000000000910000-memory.dmp

    Filesize

    5.1MB

  • memory/2036-74-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/2036-73-0x0000000000400000-0x0000000000910000-memory.dmp

    Filesize

    5.1MB

  • memory/2036-72-0x0000000000400000-0x0000000000910000-memory.dmp

    Filesize

    5.1MB

  • memory/2036-71-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/2036-70-0x00000000013B0000-0x00000000018C0000-memory.dmp

    Filesize

    5.1MB

  • memory/2036-69-0x0000000000400000-0x0000000000910000-memory.dmp

    Filesize

    5.1MB

  • memory/2036-68-0x0000000000400000-0x0000000000910000-memory.dmp

    Filesize

    5.1MB

  • memory/2036-67-0x0000000076EA0000-0x0000000077020000-memory.dmp

    Filesize

    1.5MB

  • memory/2036-66-0x00000000013B0000-0x00000000018C0000-memory.dmp

    Filesize

    5.1MB

  • memory/2036-65-0x00000000013B0000-0x00000000018C0000-memory.dmp

    Filesize

    5.1MB

  • memory/2036-57-0x0000000000000000-mapping.dmp