Analysis
-
max time kernel
373s -
max time network
435s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
19/12/2022, 00:21
Static task
static1
Behavioral task
behavioral1
Sample
Bitcoin Bull Prediction.exe
Resource
win10-20220812-en
Behavioral task
behavioral2
Sample
Bitcoin Bull Prediction.exe
Resource
win7-20220901-en
Behavioral task
behavioral3
Sample
Bitcoin Bull Prediction.pdf
Resource
win10-20220812-en
Behavioral task
behavioral4
Sample
Bitcoin Bull Prediction.pdf
Resource
win7-20221111-en
Behavioral task
behavioral5
Sample
Dump.bin
Resource
win10-20220812-en
Behavioral task
behavioral6
Sample
Dump.bin
Resource
win7-20221111-en
General
-
Target
Bitcoin Bull Prediction.exe
-
Size
158KB
-
MD5
931d0969654af3f77fc1dab9e2bd66b1
-
SHA1
7cf53577520861a1833ae99489c307f98da01b4b
-
SHA256
f14c5bad5219b1ed5166eb02f5ff08a890a181cef2af565f3fe7bcea9c870e22
-
SHA512
285a0b32acdb79a7a83de073a3db74bde507cf219ed686b05b866c345e09c893526cdbc4daaa55cf0b3f3176ccee9f30ae14c3e75adaf5239918230e0da41798
-
SSDEEP
3072:PXbMMsw6csaVqBuH9HJt+BvgDzuLlTlB:YFwnlwBK9f+04lTH
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2880 Bitcoin Bull Prediction.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000_Classes\Local Settings Bitcoin Bull Prediction.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2880 Bitcoin Bull Prediction.exe 2880 Bitcoin Bull Prediction.exe 3388 AcroRd32.exe 3388 AcroRd32.exe 3388 AcroRd32.exe 3388 AcroRd32.exe 3388 AcroRd32.exe 3388 AcroRd32.exe 3388 AcroRd32.exe 3388 AcroRd32.exe 3388 AcroRd32.exe 3388 AcroRd32.exe 3388 AcroRd32.exe 3388 AcroRd32.exe 3388 AcroRd32.exe 3388 AcroRd32.exe 3388 AcroRd32.exe 3388 AcroRd32.exe 3388 AcroRd32.exe 3388 AcroRd32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3388 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3388 AcroRd32.exe 3388 AcroRd32.exe 3388 AcroRd32.exe 3388 AcroRd32.exe 3388 AcroRd32.exe 3388 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2880 wrote to memory of 3388 2880 Bitcoin Bull Prediction.exe 66 PID 2880 wrote to memory of 3388 2880 Bitcoin Bull Prediction.exe 66 PID 2880 wrote to memory of 3388 2880 Bitcoin Bull Prediction.exe 66 PID 3388 wrote to memory of 3048 3388 AcroRd32.exe 67 PID 3388 wrote to memory of 3048 3388 AcroRd32.exe 67 PID 3388 wrote to memory of 3048 3388 AcroRd32.exe 67 PID 3048 wrote to memory of 2000 3048 RdrCEF.exe 69 PID 3048 wrote to memory of 2000 3048 RdrCEF.exe 69 PID 3048 wrote to memory of 2000 3048 RdrCEF.exe 69 PID 3048 wrote to memory of 2000 3048 RdrCEF.exe 69 PID 3048 wrote to memory of 2000 3048 RdrCEF.exe 69 PID 3048 wrote to memory of 2000 3048 RdrCEF.exe 69 PID 3048 wrote to memory of 2000 3048 RdrCEF.exe 69 PID 3048 wrote to memory of 2000 3048 RdrCEF.exe 69 PID 3048 wrote to memory of 2000 3048 RdrCEF.exe 69 PID 3048 wrote to memory of 2000 3048 RdrCEF.exe 69 PID 3048 wrote to memory of 2000 3048 RdrCEF.exe 69 PID 3048 wrote to memory of 2000 3048 RdrCEF.exe 69 PID 3048 wrote to memory of 2000 3048 RdrCEF.exe 69 PID 3048 wrote to memory of 2000 3048 RdrCEF.exe 69 PID 3048 wrote to memory of 2000 3048 RdrCEF.exe 69 PID 3048 wrote to memory of 2000 3048 RdrCEF.exe 69 PID 3048 wrote to memory of 2000 3048 RdrCEF.exe 69 PID 3048 wrote to memory of 2000 3048 RdrCEF.exe 69 PID 3048 wrote to memory of 2000 3048 RdrCEF.exe 69 PID 3048 wrote to memory of 2000 3048 RdrCEF.exe 69 PID 3048 wrote to memory of 2000 3048 RdrCEF.exe 69 PID 3048 wrote to memory of 2000 3048 RdrCEF.exe 69 PID 3048 wrote to memory of 2000 3048 RdrCEF.exe 69 PID 3048 wrote to memory of 2000 3048 RdrCEF.exe 69 PID 3048 wrote to memory of 2000 3048 RdrCEF.exe 69 PID 3048 wrote to memory of 2000 3048 RdrCEF.exe 69 PID 3048 wrote to memory of 2000 3048 RdrCEF.exe 69 PID 3048 wrote to memory of 2000 3048 RdrCEF.exe 69 PID 3048 wrote to memory of 2000 3048 RdrCEF.exe 69 PID 3048 wrote to memory of 2000 3048 RdrCEF.exe 69 PID 3048 wrote to memory of 2000 3048 RdrCEF.exe 69 PID 3048 wrote to memory of 2000 3048 RdrCEF.exe 69 PID 3048 wrote to memory of 2000 3048 RdrCEF.exe 69 PID 3048 wrote to memory of 2000 3048 RdrCEF.exe 69 PID 3048 wrote to memory of 2000 3048 RdrCEF.exe 69 PID 3048 wrote to memory of 2000 3048 RdrCEF.exe 69 PID 3048 wrote to memory of 2000 3048 RdrCEF.exe 69 PID 3048 wrote to memory of 2000 3048 RdrCEF.exe 69 PID 3048 wrote to memory of 2000 3048 RdrCEF.exe 69 PID 3048 wrote to memory of 2000 3048 RdrCEF.exe 69 PID 3048 wrote to memory of 2000 3048 RdrCEF.exe 69 PID 3048 wrote to memory of 2000 3048 RdrCEF.exe 69 PID 3048 wrote to memory of 2000 3048 RdrCEF.exe 69 PID 3048 wrote to memory of 4204 3048 RdrCEF.exe 70 PID 3048 wrote to memory of 4204 3048 RdrCEF.exe 70 PID 3048 wrote to memory of 4204 3048 RdrCEF.exe 70 PID 3048 wrote to memory of 4204 3048 RdrCEF.exe 70 PID 3048 wrote to memory of 4204 3048 RdrCEF.exe 70 PID 3048 wrote to memory of 4204 3048 RdrCEF.exe 70 PID 3048 wrote to memory of 4204 3048 RdrCEF.exe 70 PID 3048 wrote to memory of 4204 3048 RdrCEF.exe 70 PID 3048 wrote to memory of 4204 3048 RdrCEF.exe 70 PID 3048 wrote to memory of 4204 3048 RdrCEF.exe 70 PID 3048 wrote to memory of 4204 3048 RdrCEF.exe 70 PID 3048 wrote to memory of 4204 3048 RdrCEF.exe 70 PID 3048 wrote to memory of 4204 3048 RdrCEF.exe 70 PID 3048 wrote to memory of 4204 3048 RdrCEF.exe 70 PID 3048 wrote to memory of 4204 3048 RdrCEF.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\Bitcoin Bull Prediction.exe"C:\Users\Admin\AppData\Local\Temp\Bitcoin Bull Prediction.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Bitcoin Bull Prediction.pdf"2⤵
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=25BFBD331FCFB1EC1382E8A4220DCDA7 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=25BFBD331FCFB1EC1382E8A4220DCDA7 --renderer-client-id=2 --mojo-platform-channel-handle=1628 --allow-no-sandbox-job /prefetch:14⤵PID:2000
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8394F8B7A7C5CDE92CC69E6A88074549 --mojo-platform-channel-handle=1672 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:4204
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=0A43274952687A9A50AED32DCE063739 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=1 --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=0A43274952687A9A50AED32DCE063739 --renderer-client-id=4 --mojo-platform-channel-handle=2064 --allow-no-sandbox-job /prefetch:14⤵PID:4416
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=8030A594BD4E73EAC18D590926D76943 --mojo-platform-channel-handle=2568 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:3588
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=EA1165B9189FC19640C3C9EE59DD7118 --mojo-platform-channel-handle=2840 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:3140
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=D2A70C53FBEF2EAE32BA65B632EBFA5C --mojo-platform-channel-handle=2920 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵PID:3796
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD5b019f180d826b16c5e09cadb134d24f4
SHA17e65258ff31ea83c3297064157541a6c7baaec34
SHA256be0d3cb6a988fb536c728d62abacd61b9977c9211f09ef6506d1351919445dd3
SHA5129bbf20afd3c8478b3ebcac7c6a2f16489f360cdb30bfc3b6d41f34a2379e63898daee9c8042901a4b6e92386fc2a24d0c13a74a66cbbcd380bc43a5fe242ccd2