Analysis

  • max time kernel
    506s
  • max time network
    509s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-es
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-eslocale:es-esos:windows10-2004-x64systemwindows
  • submitted
    28-02-2023 14:08

General

  • Target

    Pass-55551_NewFileV3.rar

  • Size

    5.4MB

  • MD5

    b4273a57d910afe2573782b3be8ae7d7

  • SHA1

    37bed27da97e64e9337e21714db92f9c6ac2e222

  • SHA256

    5154e8b32a016e05675f20c98d523681aa887e180c1fde2a10fc0007e3023bcc

  • SHA512

    cfaa4efea16d8a9d3211821ed6de180e7e0ec86883d951e87dd427facda125b35c70f005365bd44a9da4f5e4b3f862762782809671f8166b655b35dc42c65824

  • SSDEEP

    98304:aIssSDsYqxJ1USRnGc9b2fGAlg/o1V5Qo6+OCEFv1AlKBjDByJp3CHO:pnbYG+S1t9sGAlg/4VTnEFdAlKTul

Malware Config

Extracted

Family

cryptbot

C2

http://xjuhie25.top/gate.php

Signatures

  • CryptBot

    A C++ stealer distributed widely in bundle with other software.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Maps connected drives based on registry 3 TTPs 4 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Pass-55551_NewFileV3.rar
    1⤵
    • Modifies registry class
    PID:4288
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1516
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:1848
    • C:\Program Files\7-Zip\7zG.exe
      "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\Pass-55551_NewFileV3\" -spe -an -ai#7zMap28002:98:7zEvent6193
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1508
    • C:\Program Files\7-Zip\7zG.exe
      "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\Pass-55551_NewFileV3\setupfile\" -spe -an -ai#7zMap19981:118:7zEvent29136
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2860
    • C:\Users\Admin\Desktop\Pass-55551_NewFileV3\setupfile\setupfile.exe
      "C:\Users\Admin\Desktop\Pass-55551_NewFileV3\setupfile\setupfile.exe"
      1⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Maps connected drives based on registry
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:536
      • C:\Windows\SysWOW64\cmd.exe
        /C schtasks /tn \Diagnostic\htudkh /create /tr """"C:\Users\Admin\AppData\Roaming\qcic\srvtst.exe""" """C:\Users\Admin\AppData\Roaming\qcic\srvtst.txt"""" /st 00:03 /f /sc once /du 9900:20 /ri 1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3812
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks /tn \Diagnostic\htudkh /create /tr """"C:\Users\Admin\AppData\Roaming\qcic\srvtst.exe""" """C:\Users\Admin\AppData\Roaming\qcic\srvtst.txt"""" /st 00:03 /f /sc once /du 9900:20 /ri 1
          3⤵
          • Creates scheduled task(s)
          PID:2080
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c timeout -t 5 && del "C:\Users\Admin\Desktop\Pass-55551_NewFileV3\setupfile\setupfile.exe"
        2⤵
          PID:4300
          • C:\Windows\SysWOW64\timeout.exe
            timeout -t 5
            3⤵
            • Delays execution with timeout.exe
            PID:1288
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --no-first-run --no-default-browser-check --noerrdialogs --disable-crash-reporter --disable-backgrounding-occluded-windows --disable-background-timer-throttling --disable-extensions-http-throttling --disable-renderer-backgrounding --disable-audio-output --silent-launch --restore-last-session --elevated --profile-directory="Default"
        1⤵
        • Enumerates system info in registry
        • Suspicious use of WriteProcessMemory
        PID:2620
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff981669758,0x7ff981669768,0x7ff981669778
          2⤵
            PID:876
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --noerrdialogs --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1804 --field-trial-handle=1816,i,9127052595023021546,17771543102455085481,131072 /prefetch:2
            2⤵
              PID:264
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --disable-audio-output --noerrdialogs --mojo-platform-channel-handle=2160 --field-trial-handle=1816,i,9127052595023021546,17771543102455085481,131072 /prefetch:8
              2⤵
                PID:1692
            • C:\Users\Admin\AppData\Roaming\qcic\srvtst.exe
              C:\Users\Admin\AppData\Roaming\qcic\srvtst.exe "C:\Users\Admin\AppData\Roaming\qcic\srvtst.txt"
              1⤵
              • Executes dropped EXE
              PID:4596
            • C:\Users\Admin\Desktop\Pass-55551_NewFileV3\setupfile\setupfile.exe
              "C:\Users\Admin\Desktop\Pass-55551_NewFileV3\setupfile\setupfile.exe"
              1⤵
              • Executes dropped EXE
              • Maps connected drives based on registry
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              PID:4412
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --no-first-run --no-default-browser-check --noerrdialogs --disable-crash-reporter --disable-backgrounding-occluded-windows --disable-background-timer-throttling --disable-extensions-http-throttling --disable-renderer-backgrounding --disable-audio-output --silent-launch --restore-last-session --elevated --profile-directory="Default"
              1⤵
              • Enumerates system info in registry
              • Suspicious use of WriteProcessMemory
              PID:1444
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff981669758,0x7ff981669768,0x7ff981669778
                2⤵
                  PID:1664
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --noerrdialogs --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1760 --field-trial-handle=2020,i,17762034270012552534,6360506292510204558,131072 /prefetch:2
                  2⤵
                    PID:3688
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --disable-audio-output --noerrdialogs --mojo-platform-channel-handle=1888 --field-trial-handle=2020,i,17762034270012552534,6360506292510204558,131072 /prefetch:8
                    2⤵
                      PID:4148

                  Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

                    Filesize

                    40B

                    MD5

                    725dfadacd7b746ba806f956314d8daf

                    SHA1

                    a217932961c1c5e788d3e2ec98f0451431d564a3

                    SHA256

                    5b496c58006f91bd0a1b1c08789fcf0415cf2ff1c0ed2044e9dd0f0a7d29679c

                    SHA512

                    ab63cfcd15058ddef4623d6da2e286658a5d225e31261a55829b1a4d77b92d91dc18d02cd71a5c0bab2d2a395a1d7aa91194764c3eb3fe6b2632e25002c9c8c0

                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Last Version

                    Filesize

                    14B

                    MD5

                    9eae63c7a967fc314dd311d9f46a45b7

                    SHA1

                    caba9c2c93acfe0b9ceb9ab19b992b0fc19c71cf

                    SHA256

                    4288925b0cf871c7458c22c46936efb0e903802feb991a0e1803be94ca6c251d

                    SHA512

                    bed924bff236bf5b6ce1df1db82e86c935e5830a20d9d24697efd82ca331e30604db8d04b0d692ec8541ec6deb2225bcc7d805b79f2db5726642198ecf6348b8

                  • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Variations

                    Filesize

                    86B

                    MD5

                    f732dbed9289177d15e236d0f8f2ddd3

                    SHA1

                    53f822af51b014bc3d4b575865d9c3ef0e4debde

                    SHA256

                    2741df9ee9e9d9883397078f94480e9bc1d9c76996eec5cfe4e77929337cbe93

                    SHA512

                    b64e5021f32e26c752fcba15a139815894309b25644e74ceca46a9aa97070bca3b77ded569a9bfd694193d035ba75b61a8d6262c8e6d5c4d76b452b38f5150a4

                  • C:\Users\Admin\AppData\Local\Temp\4193.tmp

                    Filesize

                    32B

                    MD5

                    987fa44e8f2f322577a051e857d5b710

                    SHA1

                    d2979061a67d821dd5ea34175af95c2533a1ff29

                    SHA256

                    cc65477af5d0510692c50feaf90d4c089b7dbcf7d967c3a9d0213a7ae7444e15

                    SHA512

                    554ad7d00b0874bb4c53e817e2df5a068e4061e1fb67d51c57122919c41f047e9c73efab6ba6482e2479391a4277cf7872f1eb6b28012c732e5bdede3f782220

                  • C:\Users\Admin\AppData\Local\Temp\43E9.tmp

                    Filesize

                    71KB

                    MD5

                    46988a922937a39036d6b71e62d0f966

                    SHA1

                    4a997f2a0360274ec7990aac156870a5a7030665

                    SHA256

                    5954db23a8424f6cb1e933387d0866910c45615f54342aa0f6dd597174393de6

                    SHA512

                    dd7774668cd24c303e670e7d096794aca67593b8d8a9b3b38aa08c148f67e74c07041f25941465b3ae030bafd76384b4b79d41c1eeebe5bd11d94ab25ef00e9d

                  • C:\Users\Admin\AppData\Local\Temp\4D3B.tmp

                    Filesize

                    2KB

                    MD5

                    18da5c19d469f921ff9d44f1f17de97b

                    SHA1

                    bef606053494e1f516431d40f2aca29cf1deeb20

                    SHA256

                    662f6389650db2471a13412664d05cfed46fef73dd1d30cf16d2c8ceeee33eb0

                    SHA512

                    9eee1b05c10544813c2eb89c48369d78e5b9260fddd8e90a34f06ac8ea2955860083c6c8ac31089276e97e269b87b4ac0c43e9dcdb7bd6091759dccb4ac0e71d

                  • C:\Users\Admin\AppData\Roaming\qcic\srvtst.exe

                    Filesize

                    872KB

                    MD5

                    c56b5f0201a3b3de53e561fe76912bfd

                    SHA1

                    2a4062e10a5de813f5688221dbeb3f3ff33eb417

                    SHA256

                    237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

                    SHA512

                    195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

                  • C:\Users\Admin\AppData\Roaming\qcic\srvtst.txt

                    Filesize

                    132KB

                    MD5

                    86c8d08a436374893e2280e05aec2f26

                    SHA1

                    4c1adde16dea43f2d2d8c3990df3f7737fcc4d81

                    SHA256

                    28beb98431319514c767d415d79bed7f2e1c71a0af8e425133a5185cf66a90f5

                    SHA512

                    fd97e017fd1f2ec15bdeb2a04a9a39df8a2fd8b4a79c6cb3748f535cf5d4e540a343e7bd20b59bbdb958461078d420f81ab76238f865b82732992e6ccab19d96

                  • C:\Users\Admin\Desktop\Pass-55551_NewFileV3\setupfile.rar

                    Filesize

                    5.4MB

                    MD5

                    34f2255c5b6bef0d305a9e89c0f3bd10

                    SHA1

                    1d1bf155ed5f8cfabc3384b7a5bdb2a0d1f7c4a9

                    SHA256

                    25ecb4d10bbe3e25a2dac571c283f9ae4f2f1121daf131759450f80a71134789

                    SHA512

                    22fcc7d00980fd756a362b62408f0e33d1a501baf7eaf3f53c4e38ee932821e68d3b193350d5d9f95c38c8362660350f2946972eaf8fbfef9b2713275df88f8f

                  • C:\Users\Admin\Desktop\Pass-55551_NewFileV3\setupfile\setupfile.exe

                    Filesize

                    315.0MB

                    MD5

                    22fd7346da087ca433c5ee67127d12c0

                    SHA1

                    85836972ddd534431dab67c5deb93ee5e76f71c7

                    SHA256

                    c9cd4412b82e1dc956e5d7a971d8495009f204e7aef07eebb3347406c7a132ec

                    SHA512

                    4c57baf3022b0a8aab2a7fa2720da1397ff8cc3c8bcc69b19c8b881e663ac27de7a1913720dbc5d171a5cd61765dc5ce22253870bb10338fe921581f19d0bcab

                  • C:\Users\Admin\Desktop\Pass-55551_NewFileV3\setupfile\setupfile.exe

                    Filesize

                    315.0MB

                    MD5

                    22fd7346da087ca433c5ee67127d12c0

                    SHA1

                    85836972ddd534431dab67c5deb93ee5e76f71c7

                    SHA256

                    c9cd4412b82e1dc956e5d7a971d8495009f204e7aef07eebb3347406c7a132ec

                    SHA512

                    4c57baf3022b0a8aab2a7fa2720da1397ff8cc3c8bcc69b19c8b881e663ac27de7a1913720dbc5d171a5cd61765dc5ce22253870bb10338fe921581f19d0bcab

                  • C:\Users\Admin\Desktop\Pass-55551_NewFileV3\setupfile\setupfile.exe

                    Filesize

                    315.0MB

                    MD5

                    22fd7346da087ca433c5ee67127d12c0

                    SHA1

                    85836972ddd534431dab67c5deb93ee5e76f71c7

                    SHA256

                    c9cd4412b82e1dc956e5d7a971d8495009f204e7aef07eebb3347406c7a132ec

                    SHA512

                    4c57baf3022b0a8aab2a7fa2720da1397ff8cc3c8bcc69b19c8b881e663ac27de7a1913720dbc5d171a5cd61765dc5ce22253870bb10338fe921581f19d0bcab

                  • \??\pipe\crashpad_1444_KLSAUVPFTHGHXDGO

                    MD5

                    d41d8cd98f00b204e9800998ecf8427e

                    SHA1

                    da39a3ee5e6b4b0d3255bfef95601890afd80709

                    SHA256

                    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                    SHA512

                    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                  • \??\pipe\crashpad_2620_VWIIUCAXQDSOUGGI

                    MD5

                    d41d8cd98f00b204e9800998ecf8427e

                    SHA1

                    da39a3ee5e6b4b0d3255bfef95601890afd80709

                    SHA256

                    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                    SHA512

                    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                  • memory/264-299-0x00007FF9A1DF0000-0x00007FF9A1DF1000-memory.dmp

                    Filesize

                    4KB

                  • memory/536-304-0x0000000014860000-0x00000000148BA000-memory.dmp

                    Filesize

                    360KB

                  • memory/536-305-0x0000000014420000-0x00000000144EE000-memory.dmp

                    Filesize

                    824KB

                  • memory/536-196-0x0000000014420000-0x00000000144EE000-memory.dmp

                    Filesize

                    824KB

                  • memory/536-194-0x0000000014860000-0x00000000148BA000-memory.dmp

                    Filesize

                    360KB

                  • memory/536-324-0x0000000014420000-0x00000000144EE000-memory.dmp

                    Filesize

                    824KB

                  • memory/536-193-0x0000000013DC0000-0x0000000013DC3000-memory.dmp

                    Filesize

                    12KB

                  • memory/4412-311-0x00000000143E0000-0x00000000144AE000-memory.dmp

                    Filesize

                    824KB

                  • memory/4412-310-0x00000000145B0000-0x000000001460A000-memory.dmp

                    Filesize

                    360KB