Analysis

  • max time kernel
    99s
  • max time network
    84s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    24-03-2023 22:37

General

  • Target

    Crespo_Loader.exe

  • Size

    1.3MB

  • MD5

    1564a6c09efd13e7d9276ea68657a7a2

  • SHA1

    89afd7e12daec09e498cdce31c42af7d3b644833

  • SHA256

    2e8bdeba54ea809da1b6be4a1d1154067cd3b996165952042924da2930896dcd

  • SHA512

    6c21ecdb7fb3d16daa00015bdf4f7afbefd1d1f472a16dc60095ee5b396b6c2c4dc0b31ade9214ea0a7f497360bc8100cd28f8e1d887aad783c8fec84249c761

  • SSDEEP

    24576:VVgSy3IRUovmtgOzAz/PTP8DdCJ1Jz1b1Ga4Xr6w9KH3eyHl/pvW5HNtoKSkLzUU:VVymUkKo/IDdMz11WrgJ/I1NtpL

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • VMProtect packed file 1 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 29 IoCs
  • Suspicious use of SendNotifyMessage 29 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Crespo_Loader.exe
    "C:\Users\Admin\AppData\Local\Temp\Crespo_Loader.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1740
    • C:\Users\Admin\AppData\Local\Temp\MMTDyMZR.exe
      "C:\Users\Admin\AppData\Local\Temp\MMTDyMZR.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:1464
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:540

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Crespo\Logs\Loader.txt
    Filesize

    53B

    MD5

    b7e811a27ef5ff499fde3fbb035b3b2c

    SHA1

    7cbc2f841f29c75444fef772179994c8b21c6285

    SHA256

    dbb28ad12f0eb8b22fc274ac63e402f950389685e50aedab5e78c94dd71a870d

    SHA512

    4bd925aa267a0ab0e335d77cdd1e7078e11fccacf39b69de8389de7995c887c869626c81232665fe63286e8f82d68f9016700876334f0e47624f85a24c846953

  • C:\Users\Admin\AppData\Local\Temp\MMTDyMZR.exe
    Filesize

    1.4MB

    MD5

    d36e2ba2c7d7f5080a9fcac564906b56

    SHA1

    1fe7fecb88addc4a0b7200671bfda300c83633cd

    SHA256

    621aafceb98966f0c7def8585c1f961c07b1ff90a47513a798466d419fba78cf

    SHA512

    6070f9f8cb503fe1c4fcfbc9f69d4cc58f19d6c9a97fc0f16ee9b53bda88ad0993b6ebf6933ebb0616fba68a7c99f106c68c20f8f24f463d89fbf10451367884

  • C:\Users\Admin\AppData\Local\Temp\MMTDyMZR.exe
    Filesize

    1.4MB

    MD5

    d36e2ba2c7d7f5080a9fcac564906b56

    SHA1

    1fe7fecb88addc4a0b7200671bfda300c83633cd

    SHA256

    621aafceb98966f0c7def8585c1f961c07b1ff90a47513a798466d419fba78cf

    SHA512

    6070f9f8cb503fe1c4fcfbc9f69d4cc58f19d6c9a97fc0f16ee9b53bda88ad0993b6ebf6933ebb0616fba68a7c99f106c68c20f8f24f463d89fbf10451367884

  • C:\Users\Admin\AppData\Roaming\CrespoBaseMenu\DLLs\Crespo.dll
    Filesize

    2.2MB

    MD5

    429f01b5b5efcf13ddd46dbf98e8a181

    SHA1

    0fa819f68ca47f4e0b61e20df02bceda7b3d4046

    SHA256

    c181c4987b4cf8bd3102c93203517cc48261cc5071f3c6098f1ad086fe8c3ee5

    SHA512

    5a3003225294ec5b1cd54fd9f8da5ddf11a95a2195bef3c64c4ba8792ff5a8e0c73b64140658781d6606077afa42b206ce88dacdcb7a7778132542642a334c0d

  • memory/540-100-0x0000000140000000-0x00000001405E8000-memory.dmp
    Filesize

    5.9MB

  • memory/540-99-0x0000000140000000-0x00000001405E8000-memory.dmp
    Filesize

    5.9MB

  • memory/540-98-0x0000000140000000-0x00000001405E8000-memory.dmp
    Filesize

    5.9MB

  • memory/540-97-0x0000000140000000-0x00000001405E8000-memory.dmp
    Filesize

    5.9MB

  • memory/1464-90-0x000000001AFE0000-0x000000001B060000-memory.dmp
    Filesize

    512KB

  • memory/1464-89-0x000000001AFE0000-0x000000001B060000-memory.dmp
    Filesize

    512KB

  • memory/1464-91-0x000000001AFE0000-0x000000001B060000-memory.dmp
    Filesize

    512KB

  • memory/1464-88-0x000000001B340000-0x000000001B6BC000-memory.dmp
    Filesize

    3.5MB

  • memory/1464-87-0x0000000000DA0000-0x0000000000F0C000-memory.dmp
    Filesize

    1.4MB

  • memory/1464-94-0x000000001AFE0000-0x000000001B060000-memory.dmp
    Filesize

    512KB

  • memory/1464-95-0x000000001AFE0000-0x000000001B060000-memory.dmp
    Filesize

    512KB

  • memory/1464-96-0x000000001AFE0000-0x000000001B060000-memory.dmp
    Filesize

    512KB

  • memory/1740-54-0x00000000001F0000-0x0000000000346000-memory.dmp
    Filesize

    1.3MB

  • memory/1740-81-0x000000001B010000-0x000000001B090000-memory.dmp
    Filesize

    512KB

  • memory/1740-57-0x000000001B010000-0x000000001B090000-memory.dmp
    Filesize

    512KB

  • memory/1740-56-0x000000001B010000-0x000000001B090000-memory.dmp
    Filesize

    512KB

  • memory/1740-55-0x000000001B400000-0x000000001B758000-memory.dmp
    Filesize

    3.3MB