Overview
overview
10Static
static
File-Software.exe
windows7-x64
10File-Software.exe
windows10-2004-x64
10Globalizat...ng.xml
windows7-x64
1Globalizat...ng.xml
windows10-2004-x64
1Globalizat...es.xml
windows7-x64
1Globalizat...es.xml
windows10-2004-x64
1Uses of Ad...ex.dll
windows7-x64
8Uses of Ad...ex.dll
windows10-2004-x64
8Uses of Ad...0x.exe
windows7-x64
Uses of Ad...0x.exe
windows10-2004-x64
Uses of Ad...ir.exe
windows7-x64
Uses of Ad...ir.exe
windows10-2004-x64
Uses of Ad...3x.exe
windows7-x64
Uses of Ad...3x.exe
windows10-2004-x64
Uses of Ad...31.exe
windows7-x64
Uses of Ad...31.exe
windows10-2004-x64
Uses of Ad...10.exe
windows7-x64
Uses of Ad...10.exe
windows10-2004-x64
Uses of Ad...er.bin
windows7-x64
3Uses of Ad...er.bin
windows10-2004-x64
3Uses of Ad...er.cat
windows7-x64
1Uses of Ad...er.cat
windows10-2004-x64
1Uses of Ad...er.inf
windows7-x64
1Uses of Ad...er.inf
windows10-2004-x64
1Uses of Ad...ex.dll
windows7-x64
1Uses of Ad...ex.dll
windows10-2004-x64
1Uses of Ad...ex.dll
windows7-x64
8Uses of Ad...ex.dll
windows10-2004-x64
8Uses of Ad...0x.exe
windows7-x64
Uses of Ad...0x.exe
windows10-2004-x64
Uses of Ad...ir.exe
windows7-x64
Uses of Ad...ir.exe
windows10-2004-x64
Analysis
-
max time kernel
60s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
12/01/2023, 13:12
Static task
static1
Behavioral task
behavioral1
Sample
File-Software.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
File-Software.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
Globalization/Time Zone/timezoneMapping.xml
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
Globalization/Time Zone/timezoneMapping.xml
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
Globalization/Time Zone/timezones.xml
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
Globalization/Time Zone/timezones.xml
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
Uses of Additional Files/WinAll/BeholdTV/amd64/bhkspex.dll
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
Uses of Additional Files/WinAll/BeholdTV/amd64/bhkspex.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral9
Sample
Uses of Additional Files/WinAll/BeholdTV/amd64/cx2310x.exe
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
Uses of Additional Files/WinAll/BeholdTV/amd64/cx2310x.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral11
Sample
Uses of Additional Files/WinAll/BeholdTV/amd64/cxpolir.exe
Resource
win7-20220901-en
Behavioral task
behavioral12
Sample
Uses of Additional Files/WinAll/BeholdTV/amd64/cxpolir.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral13
Sample
Uses of Additional Files/WinAll/BeholdTV/amd64/saa713x.exe
Resource
win7-20221111-en
Behavioral task
behavioral14
Sample
Uses of Additional Files/WinAll/BeholdTV/amd64/saa713x.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral15
Sample
Uses of Additional Files/WinAll/BeholdTV/amd64/saa7231.exe
Resource
win7-20221111-en
Behavioral task
behavioral16
Sample
Uses of Additional Files/WinAll/BeholdTV/amd64/saa7231.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
Uses of Additional Files/WinAll/BeholdTV/amd64/ttm6010.exe
Resource
win7-20220812-en
Behavioral task
behavioral18
Sample
Uses of Additional Files/WinAll/BeholdTV/amd64/ttm6010.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral19
Sample
Uses of Additional Files/WinAll/BeholdTV/beholder.bin
Resource
win7-20221111-en
Behavioral task
behavioral20
Sample
Uses of Additional Files/WinAll/BeholdTV/beholder.bin
Resource
win10v2004-20221111-en
Behavioral task
behavioral21
Sample
Uses of Additional Files/WinAll/BeholdTV/beholder.cat
Resource
win7-20221111-en
Behavioral task
behavioral22
Sample
Uses of Additional Files/WinAll/BeholdTV/beholder.cat
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
Uses of Additional Files/WinAll/BeholdTV/beholder.inf
Resource
win7-20220812-en
Behavioral task
behavioral24
Sample
Uses of Additional Files/WinAll/BeholdTV/beholder.inf
Resource
win10v2004-20220901-en
Behavioral task
behavioral25
Sample
Uses of Additional Files/WinAll/BeholdTV/bhkspex.dll
Resource
win7-20220812-en
Behavioral task
behavioral26
Sample
Uses of Additional Files/WinAll/BeholdTV/bhkspex.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral27
Sample
Uses of Additional Files/WinAll/BeholdTV/bhkspex.dll
Resource
win7-20221111-en
Behavioral task
behavioral28
Sample
Uses of Additional Files/WinAll/BeholdTV/bhkspex.dll
Resource
win10v2004-20221111-en
Behavioral task
behavioral29
Sample
Uses of Additional Files/WinAll/BeholdTV/cx2310x.exe
Resource
win7-20220812-en
Behavioral task
behavioral30
Sample
Uses of Additional Files/WinAll/BeholdTV/cx2310x.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral31
Sample
Uses of Additional Files/WinAll/BeholdTV/cxpolir.exe
Resource
win7-20220901-en
Behavioral task
behavioral32
Sample
Uses of Additional Files/WinAll/BeholdTV/cxpolir.exe
Resource
win10v2004-20221111-en
General
-
Target
File-Software.exe
-
Size
325.6MB
-
MD5
6d1f1671090e893ce086312b07ebee3c
-
SHA1
cf5a5ecee6926479c5746d69581aa638871fbfad
-
SHA256
5b0e89fa475da638b2af60f36fc48e899db8c8b724d06fb67e4219a8ac3cd274
-
SHA512
dda620583625f041d1c768a7db7056af0633f0dfa31265a53e16624e4549f42c47ccd4effbac0de6553136cf3f47cd77696583a2daf9c476c816ba8f5f43a4fc
-
SSDEEP
49152:MULYDF3u3gv73aga4vdDsbx0vl6QO9QK67UMt/0Nu6pGBIbJn/yyD3I8gA7sNa8h:36jUxwy44/Dv4/KkcXv69PvQP
Malware Config
Extracted
cryptbot
http://avoguc410.top/gate.php
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1744 mchost.exe -
Deletes itself 1 IoCs
pid Process 1876 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum File-Software.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 File-Software.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 File-Software.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString File-Software.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz File-Software.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1296 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1164 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1016 File-Software.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1016 wrote to memory of 1756 1016 File-Software.exe 28 PID 1016 wrote to memory of 1756 1016 File-Software.exe 28 PID 1016 wrote to memory of 1756 1016 File-Software.exe 28 PID 1016 wrote to memory of 1756 1016 File-Software.exe 28 PID 1756 wrote to memory of 1296 1756 cmd.exe 30 PID 1756 wrote to memory of 1296 1756 cmd.exe 30 PID 1756 wrote to memory of 1296 1756 cmd.exe 30 PID 1756 wrote to memory of 1296 1756 cmd.exe 30 PID 1016 wrote to memory of 1876 1016 File-Software.exe 32 PID 1016 wrote to memory of 1876 1016 File-Software.exe 32 PID 1016 wrote to memory of 1876 1016 File-Software.exe 32 PID 1016 wrote to memory of 1876 1016 File-Software.exe 32 PID 1876 wrote to memory of 1164 1876 cmd.exe 34 PID 1876 wrote to memory of 1164 1876 cmd.exe 34 PID 1876 wrote to memory of 1164 1876 cmd.exe 34 PID 1876 wrote to memory of 1164 1876 cmd.exe 34 PID 684 wrote to memory of 1744 684 taskeng.exe 36 PID 684 wrote to memory of 1744 684 taskeng.exe 36 PID 684 wrote to memory of 1744 684 taskeng.exe 36 PID 684 wrote to memory of 1744 684 taskeng.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\File-Software.exe"C:\Users\Admin\AppData\Local\Temp\File-Software.exe"1⤵
- Maps connected drives based on registry
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\SysWOW64\cmd.exe/C schtasks /create /tn \Mozilla\kcvjkg /tr """"C:\Users\Admin\AppData\Roaming\pjwkesacls\mchost.exe""" """C:\Users\Admin\AppData\Roaming\pjwkesacls\mchost.chm"""" /st 00:10 /du 9700:20 /sc once /ri 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn \Mozilla\kcvjkg /tr """"C:\Users\Admin\AppData\Roaming\pjwkesacls\mchost.exe""" """C:\Users\Admin\AppData\Roaming\pjwkesacls\mchost.chm"""" /st 00:10 /du 9700:20 /sc once /ri 1 /f3⤵
- Creates scheduled task(s)
PID:1296
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout -t 5 && del "C:\Users\Admin\AppData\Local\Temp\File-Software.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\timeout.exetimeout -t 53⤵
- Delays execution with timeout.exe
PID:1164
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {05A0DFB7-306B-4D8D-9E4E-42077B685C92} S-1-5-21-3845472200-3839195424-595303356-1000:ZERMMMDR\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Users\Admin\AppData\Roaming\pjwkesacls\mchost.exeC:\Users\Admin\AppData\Roaming\pjwkesacls\mchost.exe "C:\Users\Admin\AppData\Roaming\pjwkesacls\mchost.chm"2⤵
- Executes dropped EXE
PID:1744
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD596907358470716ecd839c83cbd2bd71c
SHA10e68ba16a07d9bb258e871360602ac86cf807e9a
SHA256bf431dfaf39b3daa481b16a9593993d3a05e08564bf3b0fbca183d3e6c7ffd86
SHA512cbecc8ad928b2c9ff9d7b121610712f7bc4d9f01b1b14e4f198329ba2a14108196a7c5b6bda70a9939583543f3bffda31a9842d1dccf7f26491fa7226846eeb1
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c