Analysis
-
max time kernel
152s -
max time network
164s -
platform
windows7_x64 -
resource
win7-20220715-en -
submitted
31-07-2022 11:42
Static task
static1
Behavioral task
behavioral1
Sample
835002f99b229e4c2c71f5c0a3760584ed45dd39c6220b0f14dbf232a123e175.exe
Resource
win7-20220715-en
General
-
Target
835002f99b229e4c2c71f5c0a3760584ed45dd39c6220b0f14dbf232a123e175.exe
-
Size
4.2MB
-
MD5
711314433abf81f90b6e54ee7c80a217
-
SHA1
2bd6a1acec7217207f17816fb8ee0ecfe747d4f5
-
SHA256
835002f99b229e4c2c71f5c0a3760584ed45dd39c6220b0f14dbf232a123e175
-
SHA512
9be7405d83715f2ab3add06a42ec7eb162ce0fd02d87560c5f86cfc237506179092f1e847fa737a0f9bbdb4ce67d1590f4024c872b0f83a22400c823af7f0944
-
SSDEEP
98304:kMQaI5Gn2QfXHZwaNsflwf4QLypfIaa2uL3adc5orvA+1o:kMDl22XH+S+tEOLe3asor4+C
Malware Config
Extracted
cryptbot
newyaer01.top
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
Setup.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Setup.exe -
Executes dropped EXE 1 IoCs
Processes:
Setup.exepid process 1364 Setup.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Setup.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Setup.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
Setup.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Wine Setup.exe -
Loads dropped DLL 4 IoCs
Processes:
835002f99b229e4c2c71f5c0a3760584ed45dd39c6220b0f14dbf232a123e175.exeSetup.exepid process 1984 835002f99b229e4c2c71f5c0a3760584ed45dd39c6220b0f14dbf232a123e175.exe 1984 835002f99b229e4c2c71f5c0a3760584ed45dd39c6220b0f14dbf232a123e175.exe 1364 Setup.exe 1364 Setup.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
Setup.exepid process 1364 Setup.exe -
Drops file in Program Files directory 3 IoCs
Processes:
835002f99b229e4c2c71f5c0a3760584ed45dd39c6220b0f14dbf232a123e175.exedescription ioc process File created C:\Program Files (x86)\New Year\Setup.exe 835002f99b229e4c2c71f5c0a3760584ed45dd39c6220b0f14dbf232a123e175.exe File created C:\Program Files (x86)\New Year\Setx.exe 835002f99b229e4c2c71f5c0a3760584ed45dd39c6220b0f14dbf232a123e175.exe File created C:\Program Files (x86)\New Year\enigma_ide.dll 835002f99b229e4c2c71f5c0a3760584ed45dd39c6220b0f14dbf232a123e175.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Setup.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Setup.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
Setup.exepid process 1364 Setup.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
Processes:
Setup.exepid process 1364 Setup.exe 1364 Setup.exe 1364 Setup.exe 1364 Setup.exe 1364 Setup.exe 1364 Setup.exe 1364 Setup.exe 1364 Setup.exe 1364 Setup.exe 1364 Setup.exe 1364 Setup.exe 1364 Setup.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
835002f99b229e4c2c71f5c0a3760584ed45dd39c6220b0f14dbf232a123e175.exedescription pid process target process PID 1984 wrote to memory of 1364 1984 835002f99b229e4c2c71f5c0a3760584ed45dd39c6220b0f14dbf232a123e175.exe Setup.exe PID 1984 wrote to memory of 1364 1984 835002f99b229e4c2c71f5c0a3760584ed45dd39c6220b0f14dbf232a123e175.exe Setup.exe PID 1984 wrote to memory of 1364 1984 835002f99b229e4c2c71f5c0a3760584ed45dd39c6220b0f14dbf232a123e175.exe Setup.exe PID 1984 wrote to memory of 1364 1984 835002f99b229e4c2c71f5c0a3760584ed45dd39c6220b0f14dbf232a123e175.exe Setup.exe PID 1984 wrote to memory of 1364 1984 835002f99b229e4c2c71f5c0a3760584ed45dd39c6220b0f14dbf232a123e175.exe Setup.exe PID 1984 wrote to memory of 1364 1984 835002f99b229e4c2c71f5c0a3760584ed45dd39c6220b0f14dbf232a123e175.exe Setup.exe PID 1984 wrote to memory of 1364 1984 835002f99b229e4c2c71f5c0a3760584ed45dd39c6220b0f14dbf232a123e175.exe Setup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\835002f99b229e4c2c71f5c0a3760584ed45dd39c6220b0f14dbf232a123e175.exe"C:\Users\Admin\AppData\Local\Temp\835002f99b229e4c2c71f5c0a3760584ed45dd39c6220b0f14dbf232a123e175.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Program Files (x86)\New Year\Setup.exe"C:\Program Files (x86)\New Year\Setup.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:1364
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD551e709380f586ce9a7147210e3a61726
SHA1afc8ec3c36083b358269da8cd44909760362aae2
SHA2561abce7851d8af7ae4c6f53ccea4a39574de4170af505fcc7c625f3fd39b5423b
SHA512053c6f4efdd62230370eb4439852d7b0079abf067b7b668388425f952fb034fbd67d066411f8a1c56ab45d2371028fa60ff0798ea02d01b853f7d479cdccd7ff
-
Filesize
2.2MB
MD551e709380f586ce9a7147210e3a61726
SHA1afc8ec3c36083b358269da8cd44909760362aae2
SHA2561abce7851d8af7ae4c6f53ccea4a39574de4170af505fcc7c625f3fd39b5423b
SHA512053c6f4efdd62230370eb4439852d7b0079abf067b7b668388425f952fb034fbd67d066411f8a1c56ab45d2371028fa60ff0798ea02d01b853f7d479cdccd7ff
-
Filesize
2.2MB
MD551e709380f586ce9a7147210e3a61726
SHA1afc8ec3c36083b358269da8cd44909760362aae2
SHA2561abce7851d8af7ae4c6f53ccea4a39574de4170af505fcc7c625f3fd39b5423b
SHA512053c6f4efdd62230370eb4439852d7b0079abf067b7b668388425f952fb034fbd67d066411f8a1c56ab45d2371028fa60ff0798ea02d01b853f7d479cdccd7ff
-
Filesize
2.2MB
MD551e709380f586ce9a7147210e3a61726
SHA1afc8ec3c36083b358269da8cd44909760362aae2
SHA2561abce7851d8af7ae4c6f53ccea4a39574de4170af505fcc7c625f3fd39b5423b
SHA512053c6f4efdd62230370eb4439852d7b0079abf067b7b668388425f952fb034fbd67d066411f8a1c56ab45d2371028fa60ff0798ea02d01b853f7d479cdccd7ff
-
Filesize
2.2MB
MD551e709380f586ce9a7147210e3a61726
SHA1afc8ec3c36083b358269da8cd44909760362aae2
SHA2561abce7851d8af7ae4c6f53ccea4a39574de4170af505fcc7c625f3fd39b5423b
SHA512053c6f4efdd62230370eb4439852d7b0079abf067b7b668388425f952fb034fbd67d066411f8a1c56ab45d2371028fa60ff0798ea02d01b853f7d479cdccd7ff
-
Filesize
14KB
MD5adb29e6b186daa765dc750128649b63d
SHA1160cbdc4cb0ac2c142d361df138c537aa7e708c9
SHA2562f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08
SHA512b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada