Analysis
-
max time kernel
152s -
max time network
164s -
platform
windows7_x64 -
resource
win7-20220715-en -
submitted
31-07-2022 11:42
Static task
static1
Behavioral task
behavioral1
Sample
835002f99b229e4c2c71f5c0a3760584ed45dd39c6220b0f14dbf232a123e175.exe
Resource
win7-20220715-en
General
-
Target
835002f99b229e4c2c71f5c0a3760584ed45dd39c6220b0f14dbf232a123e175.exe
-
Size
4.2MB
-
MD5
711314433abf81f90b6e54ee7c80a217
-
SHA1
2bd6a1acec7217207f17816fb8ee0ecfe747d4f5
-
SHA256
835002f99b229e4c2c71f5c0a3760584ed45dd39c6220b0f14dbf232a123e175
-
SHA512
9be7405d83715f2ab3add06a42ec7eb162ce0fd02d87560c5f86cfc237506179092f1e847fa737a0f9bbdb4ce67d1590f4024c872b0f83a22400c823af7f0944
-
SSDEEP
98304:kMQaI5Gn2QfXHZwaNsflwf4QLypfIaa2uL3adc5orvA+1o:kMDl22XH+S+tEOLe3asor4+C
Malware Config
Extracted
cryptbot
newyaer01.top
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Setup.exe -
Executes dropped EXE 1 IoCs
pid Process 1364 Setup.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Setup.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Wine Setup.exe -
Loads dropped DLL 4 IoCs
pid Process 1984 835002f99b229e4c2c71f5c0a3760584ed45dd39c6220b0f14dbf232a123e175.exe 1984 835002f99b229e4c2c71f5c0a3760584ed45dd39c6220b0f14dbf232a123e175.exe 1364 Setup.exe 1364 Setup.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1364 Setup.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\New Year\Setup.exe 835002f99b229e4c2c71f5c0a3760584ed45dd39c6220b0f14dbf232a123e175.exe File created C:\Program Files (x86)\New Year\Setx.exe 835002f99b229e4c2c71f5c0a3760584ed45dd39c6220b0f14dbf232a123e175.exe File created C:\Program Files (x86)\New Year\enigma_ide.dll 835002f99b229e4c2c71f5c0a3760584ed45dd39c6220b0f14dbf232a123e175.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Setup.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1364 Setup.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 1364 Setup.exe 1364 Setup.exe 1364 Setup.exe 1364 Setup.exe 1364 Setup.exe 1364 Setup.exe 1364 Setup.exe 1364 Setup.exe 1364 Setup.exe 1364 Setup.exe 1364 Setup.exe 1364 Setup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1984 wrote to memory of 1364 1984 835002f99b229e4c2c71f5c0a3760584ed45dd39c6220b0f14dbf232a123e175.exe 27 PID 1984 wrote to memory of 1364 1984 835002f99b229e4c2c71f5c0a3760584ed45dd39c6220b0f14dbf232a123e175.exe 27 PID 1984 wrote to memory of 1364 1984 835002f99b229e4c2c71f5c0a3760584ed45dd39c6220b0f14dbf232a123e175.exe 27 PID 1984 wrote to memory of 1364 1984 835002f99b229e4c2c71f5c0a3760584ed45dd39c6220b0f14dbf232a123e175.exe 27 PID 1984 wrote to memory of 1364 1984 835002f99b229e4c2c71f5c0a3760584ed45dd39c6220b0f14dbf232a123e175.exe 27 PID 1984 wrote to memory of 1364 1984 835002f99b229e4c2c71f5c0a3760584ed45dd39c6220b0f14dbf232a123e175.exe 27 PID 1984 wrote to memory of 1364 1984 835002f99b229e4c2c71f5c0a3760584ed45dd39c6220b0f14dbf232a123e175.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\835002f99b229e4c2c71f5c0a3760584ed45dd39c6220b0f14dbf232a123e175.exe"C:\Users\Admin\AppData\Local\Temp\835002f99b229e4c2c71f5c0a3760584ed45dd39c6220b0f14dbf232a123e175.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\New Year\Setup.exe"C:\Program Files (x86)\New Year\Setup.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:1364
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD551e709380f586ce9a7147210e3a61726
SHA1afc8ec3c36083b358269da8cd44909760362aae2
SHA2561abce7851d8af7ae4c6f53ccea4a39574de4170af505fcc7c625f3fd39b5423b
SHA512053c6f4efdd62230370eb4439852d7b0079abf067b7b668388425f952fb034fbd67d066411f8a1c56ab45d2371028fa60ff0798ea02d01b853f7d479cdccd7ff
-
Filesize
2.2MB
MD551e709380f586ce9a7147210e3a61726
SHA1afc8ec3c36083b358269da8cd44909760362aae2
SHA2561abce7851d8af7ae4c6f53ccea4a39574de4170af505fcc7c625f3fd39b5423b
SHA512053c6f4efdd62230370eb4439852d7b0079abf067b7b668388425f952fb034fbd67d066411f8a1c56ab45d2371028fa60ff0798ea02d01b853f7d479cdccd7ff
-
Filesize
2.2MB
MD551e709380f586ce9a7147210e3a61726
SHA1afc8ec3c36083b358269da8cd44909760362aae2
SHA2561abce7851d8af7ae4c6f53ccea4a39574de4170af505fcc7c625f3fd39b5423b
SHA512053c6f4efdd62230370eb4439852d7b0079abf067b7b668388425f952fb034fbd67d066411f8a1c56ab45d2371028fa60ff0798ea02d01b853f7d479cdccd7ff
-
Filesize
2.2MB
MD551e709380f586ce9a7147210e3a61726
SHA1afc8ec3c36083b358269da8cd44909760362aae2
SHA2561abce7851d8af7ae4c6f53ccea4a39574de4170af505fcc7c625f3fd39b5423b
SHA512053c6f4efdd62230370eb4439852d7b0079abf067b7b668388425f952fb034fbd67d066411f8a1c56ab45d2371028fa60ff0798ea02d01b853f7d479cdccd7ff
-
Filesize
2.2MB
MD551e709380f586ce9a7147210e3a61726
SHA1afc8ec3c36083b358269da8cd44909760362aae2
SHA2561abce7851d8af7ae4c6f53ccea4a39574de4170af505fcc7c625f3fd39b5423b
SHA512053c6f4efdd62230370eb4439852d7b0079abf067b7b668388425f952fb034fbd67d066411f8a1c56ab45d2371028fa60ff0798ea02d01b853f7d479cdccd7ff
-
Filesize
14KB
MD5adb29e6b186daa765dc750128649b63d
SHA1160cbdc4cb0ac2c142d361df138c537aa7e708c9
SHA2562f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08
SHA512b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada