Analysis
-
max time kernel
136s -
max time network
189s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
08/09/2022, 05:13
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.CrypterX-gen.27794.exe
Resource
win7-20220812-en
General
-
Target
SecuriteInfo.com.Win32.CrypterX-gen.27794.exe
-
Size
564KB
-
MD5
d2511f548930bc0a616afb4bf2f5eb59
-
SHA1
dfd9d5479816b67c213fa35f87280c192d1a20a1
-
SHA256
d867f1bbf4a3d8e8de9ce9c75d7d1690a9ab15ba919ed0d01f6bc66683e074c4
-
SHA512
e9922aefdd68bfbb1773ccf75f2412af987e67570d876bfd99aee5fd46c616a430fe8ec9fc1917a797ca3d433d94cc81e87ca5fe8eea38638361b4bbacd6651e
-
SSDEEP
12288:g8l02b1zzUFFiRUUWgSXGjITqZfs+Bog:blfzzUFAKDlW8Tqf
Malware Config
Extracted
nanocore
1.2.2.0
brewsterchristophe.ddns.net:5899
194,147,5,75:5899
b8aebc29-8c64-444f-99e6-dc4122e9bbfc
-
activate_away_mode
true
-
backup_connection_host
194,147,5,75
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2022-04-29T03:26:40.572298236Z
-
bypass_user_account_control
false
-
bypass_user_account_control_data
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
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
5899
-
default_group
Default
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
b8aebc29-8c64-444f-99e6-dc4122e9bbfc
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
brewsterchristophe.ddns.net
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
false
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1172 Bin.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\Bin = "C:\\Users\\Admin\\Desktop\\Bin.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\NTFS Monitor = "C:\\Program Files (x86)\\NTFS Monitor\\ntfsmon.exe" RegAsm.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RegAsm.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1172 set thread context of 1144 1172 Bin.exe 37 -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\NTFS Monitor\ntfsmon.exe RegAsm.exe File created C:\Program Files (x86)\NTFS Monitor\ntfsmon.exe RegAsm.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1608 schtasks.exe 1768 schtasks.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 984 PING.EXE 1804 PING.EXE 1412 PING.EXE -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 952 SecuriteInfo.com.Win32.CrypterX-gen.27794.exe 952 SecuriteInfo.com.Win32.CrypterX-gen.27794.exe 952 SecuriteInfo.com.Win32.CrypterX-gen.27794.exe 1172 Bin.exe 1172 Bin.exe 1144 RegAsm.exe 1144 RegAsm.exe 1144 RegAsm.exe 1144 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 952 SecuriteInfo.com.Win32.CrypterX-gen.27794.exe Token: SeDebugPrivilege 1172 Bin.exe Token: SeDebugPrivilege 1144 RegAsm.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 952 wrote to memory of 2000 952 SecuriteInfo.com.Win32.CrypterX-gen.27794.exe 27 PID 952 wrote to memory of 2000 952 SecuriteInfo.com.Win32.CrypterX-gen.27794.exe 27 PID 952 wrote to memory of 2000 952 SecuriteInfo.com.Win32.CrypterX-gen.27794.exe 27 PID 952 wrote to memory of 2000 952 SecuriteInfo.com.Win32.CrypterX-gen.27794.exe 27 PID 2000 wrote to memory of 984 2000 cmd.exe 29 PID 2000 wrote to memory of 984 2000 cmd.exe 29 PID 2000 wrote to memory of 984 2000 cmd.exe 29 PID 2000 wrote to memory of 984 2000 cmd.exe 29 PID 952 wrote to memory of 1296 952 SecuriteInfo.com.Win32.CrypterX-gen.27794.exe 30 PID 952 wrote to memory of 1296 952 SecuriteInfo.com.Win32.CrypterX-gen.27794.exe 30 PID 952 wrote to memory of 1296 952 SecuriteInfo.com.Win32.CrypterX-gen.27794.exe 30 PID 952 wrote to memory of 1296 952 SecuriteInfo.com.Win32.CrypterX-gen.27794.exe 30 PID 1296 wrote to memory of 1804 1296 cmd.exe 32 PID 1296 wrote to memory of 1804 1296 cmd.exe 32 PID 1296 wrote to memory of 1804 1296 cmd.exe 32 PID 1296 wrote to memory of 1804 1296 cmd.exe 32 PID 2000 wrote to memory of 1548 2000 cmd.exe 33 PID 2000 wrote to memory of 1548 2000 cmd.exe 33 PID 2000 wrote to memory of 1548 2000 cmd.exe 33 PID 2000 wrote to memory of 1548 2000 cmd.exe 33 PID 1296 wrote to memory of 1412 1296 cmd.exe 34 PID 1296 wrote to memory of 1412 1296 cmd.exe 34 PID 1296 wrote to memory of 1412 1296 cmd.exe 34 PID 1296 wrote to memory of 1412 1296 cmd.exe 34 PID 1296 wrote to memory of 1172 1296 cmd.exe 36 PID 1296 wrote to memory of 1172 1296 cmd.exe 36 PID 1296 wrote to memory of 1172 1296 cmd.exe 36 PID 1296 wrote to memory of 1172 1296 cmd.exe 36 PID 1172 wrote to memory of 1144 1172 Bin.exe 37 PID 1172 wrote to memory of 1144 1172 Bin.exe 37 PID 1172 wrote to memory of 1144 1172 Bin.exe 37 PID 1172 wrote to memory of 1144 1172 Bin.exe 37 PID 1172 wrote to memory of 1144 1172 Bin.exe 37 PID 1172 wrote to memory of 1144 1172 Bin.exe 37 PID 1172 wrote to memory of 1144 1172 Bin.exe 37 PID 1172 wrote to memory of 1144 1172 Bin.exe 37 PID 1172 wrote to memory of 1144 1172 Bin.exe 37 PID 1172 wrote to memory of 1144 1172 Bin.exe 37 PID 1172 wrote to memory of 1144 1172 Bin.exe 37 PID 1172 wrote to memory of 1144 1172 Bin.exe 37 PID 1144 wrote to memory of 1768 1144 RegAsm.exe 38 PID 1144 wrote to memory of 1768 1144 RegAsm.exe 38 PID 1144 wrote to memory of 1768 1144 RegAsm.exe 38 PID 1144 wrote to memory of 1768 1144 RegAsm.exe 38 PID 1144 wrote to memory of 1608 1144 RegAsm.exe 40 PID 1144 wrote to memory of 1608 1144 RegAsm.exe 40 PID 1144 wrote to memory of 1608 1144 RegAsm.exe 40 PID 1144 wrote to memory of 1608 1144 RegAsm.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.CrypterX-gen.27794.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.CrypterX-gen.27794.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 12 > nul && REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Bin" /t REG_SZ /d "C:\Users\Admin\Desktop\Bin.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 123⤵
- Runs ping.exe
PID:984
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Bin" /t REG_SZ /d "C:\Users\Admin\Desktop\Bin.exe"3⤵
- Adds Run key to start application
PID:1548
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 14 > nul && copy "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.CrypterX-gen.27794.exe" "C:\Users\Admin\Desktop\Bin.exe" && ping 127.0.0.1 -n 14 > nul && "C:\Users\Admin\Desktop\Bin.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 143⤵
- Runs ping.exe
PID:1804
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 143⤵
- Runs ping.exe
PID:1412
-
-
C:\Users\Admin\Desktop\Bin.exe"C:\Users\Admin\Desktop\Bin.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "NTFS Monitor" /xml "C:\Users\Admin\AppData\Local\Temp\tmp53CC.tmp"5⤵
- Creates scheduled task(s)
PID:1768
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "NTFS Monitor Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp5543.tmp"5⤵
- Creates scheduled task(s)
PID:1608
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD548ef7fa9033389ad7929d7a6b9d10298
SHA19db6cb7325c8bdf66a15f7b5f34703709a45aeb6
SHA2560c1b5f67eeb276d1d4205b138ce32bc6149924e02281a2db8e4623a700e88f15
SHA512ac8bd104ecbacc9bccce9e087f67e5b18072d59367ccd31d4e66132b6baaea520cba5b9b59464483d86abf74826b382c402f12e9a586c99bda8c78a0de33944e
-
Filesize
1KB
MD5981e126601526eaa5b0ad45c496c4465
SHA1d610d6a21a8420cc73fcd3e54ddae75a5897b28b
SHA25611ae277dfa39e7038b782ca6557339e7fe88533fe83705c356a1500a1402d527
SHA512a59fb704d931ccb7e1ec1a7b98e24ccd8708be529066c6de4b673098cdebef539f7f50d9e051c43954b5a8e7f810862b3a4ede170f131e080dadc3e763ed4bdb
-
Filesize
564KB
MD5d2511f548930bc0a616afb4bf2f5eb59
SHA1dfd9d5479816b67c213fa35f87280c192d1a20a1
SHA256d867f1bbf4a3d8e8de9ce9c75d7d1690a9ab15ba919ed0d01f6bc66683e074c4
SHA512e9922aefdd68bfbb1773ccf75f2412af987e67570d876bfd99aee5fd46c616a430fe8ec9fc1917a797ca3d433d94cc81e87ca5fe8eea38638361b4bbacd6651e
-
Filesize
564KB
MD5d2511f548930bc0a616afb4bf2f5eb59
SHA1dfd9d5479816b67c213fa35f87280c192d1a20a1
SHA256d867f1bbf4a3d8e8de9ce9c75d7d1690a9ab15ba919ed0d01f6bc66683e074c4
SHA512e9922aefdd68bfbb1773ccf75f2412af987e67570d876bfd99aee5fd46c616a430fe8ec9fc1917a797ca3d433d94cc81e87ca5fe8eea38638361b4bbacd6651e