Analysis

  • max time kernel
    145s
  • max time network
    139s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    15/04/2023, 15:45

General

  • Target

    574afcec719331221014fefc45e623e57ff81468b21fcbc186fa7f448be48a40.exe

  • Size

    585KB

  • MD5

    9a75a6d3afd26306f563d96dc2517225

  • SHA1

    fadb011bcecdd3919242b4019d0746772ac48ce6

  • SHA256

    574afcec719331221014fefc45e623e57ff81468b21fcbc186fa7f448be48a40

  • SHA512

    3ee3787329425f3e71b507d58b84797df54f82e535e23b146a3185e892c93628daec0e9fe6fd3d64bef50ec4e1f378e93c45fd38ae3e11aafd6c4f8bfff56782

  • SSDEEP

    1536:6aRU9m4HYvSIX0u+7+j71iMs5gU5OuTcjCNON9PApdpihLNafpo:kOhX0N7+f1iV5bcj0wWduLIho

Malware Config

Extracted

Family

cryptbot

C2

http://bluejackover.com/gate.php

Signatures

  • CryptBot

    A C++ stealer distributed widely in bundle with other software.

  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\574afcec719331221014fefc45e623e57ff81468b21fcbc186fa7f448be48a40.exe
    "C:\Users\Admin\AppData\Local\Temp\574afcec719331221014fefc45e623e57ff81468b21fcbc186fa7f448be48a40.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4308
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\putdemovl.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\putdemovl.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1852
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMwA1AA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4344
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\putdemovl.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\putdemovl.exe
        3⤵
        • Executes dropped EXE
        PID:2760
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\putdemovl.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\putdemovl.exe
        3⤵
        • Executes dropped EXE
        • Maps connected drives based on registry
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2812
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c timeout -t 5 && del "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\putdemovl.exe"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4732
          • C:\Windows\SysWOW64\timeout.exe
            timeout -t 5
            5⤵
            • Delays execution with timeout.exe
            PID:4788

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\DAA7.tmp

    Filesize

    32B

    MD5

    a3a36a25ef7c683aa2f509aec17e6a71

    SHA1

    14cea488cd54796c32f02d2fbc946e752c447dce

    SHA256

    2812845af7c11d6a096a483dfc01badebdd2671c2e825fbacf4cfe4aa7e6b9a4

    SHA512

    5e2ee9c0d967ae960e4280924a91992e5f7a4d6fe0c7af1a6f4e734e2f32da6d7b74b3b27846c689713e64c482d4b85f87ce3dd3309299b13fad7f46eab4a192

  • C:\Users\Admin\AppData\Local\Temp\F19E.tmp

    Filesize

    72KB

    MD5

    2b8e1b75b4d4fdf0c640838191ac3946

    SHA1

    dfac012ccaa015f6a9ec5bd1c55ffa7b8074fb7f

    SHA256

    17a69481ffd684f025b0fe6b0f22529bd8454c49915e580da43fcb08a0c56e4e

    SHA512

    3c4de03250813dc78b772cc7e3246ac2726c37fae00844bfceda683e05506b53ba7ea95a06e2929e8ec736ccd50a9138e9f6e3c80980ebde5ed7ac66f06cc038

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\putdemovl.exe

    Filesize

    351.0MB

    MD5

    a0255d2458d8a8089b444120e94c0057

    SHA1

    78a82cb307b5b9e82e26a36f6bba3d79464746fc

    SHA256

    234c8b8c391d17d2bb64f12db5ac50b2bfaf81e57f1b233daeb3f0e4429ababa

    SHA512

    40ae6484c161535c21a87e05d94e04ead1fc4054256051f092654bdfaddc25c58a612da8c23ecc959ecbc31d450cad4500da12d23be2c203de6e28ad157051f7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\putdemovl.exe

    Filesize

    351.0MB

    MD5

    a0255d2458d8a8089b444120e94c0057

    SHA1

    78a82cb307b5b9e82e26a36f6bba3d79464746fc

    SHA256

    234c8b8c391d17d2bb64f12db5ac50b2bfaf81e57f1b233daeb3f0e4429ababa

    SHA512

    40ae6484c161535c21a87e05d94e04ead1fc4054256051f092654bdfaddc25c58a612da8c23ecc959ecbc31d450cad4500da12d23be2c203de6e28ad157051f7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\putdemovl.exe

    Filesize

    351.0MB

    MD5

    a0255d2458d8a8089b444120e94c0057

    SHA1

    78a82cb307b5b9e82e26a36f6bba3d79464746fc

    SHA256

    234c8b8c391d17d2bb64f12db5ac50b2bfaf81e57f1b233daeb3f0e4429ababa

    SHA512

    40ae6484c161535c21a87e05d94e04ead1fc4054256051f092654bdfaddc25c58a612da8c23ecc959ecbc31d450cad4500da12d23be2c203de6e28ad157051f7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\putdemovl.exe

    Filesize

    351.0MB

    MD5

    a0255d2458d8a8089b444120e94c0057

    SHA1

    78a82cb307b5b9e82e26a36f6bba3d79464746fc

    SHA256

    234c8b8c391d17d2bb64f12db5ac50b2bfaf81e57f1b233daeb3f0e4429ababa

    SHA512

    40ae6484c161535c21a87e05d94e04ead1fc4054256051f092654bdfaddc25c58a612da8c23ecc959ecbc31d450cad4500da12d23be2c203de6e28ad157051f7

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_wynqzslk.ih5.ps1

    Filesize

    1B

    MD5

    c4ca4238a0b923820dcc509a6f75849b

    SHA1

    356a192b7913b04c54574d18c28d46e6395428ab

    SHA256

    6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

    SHA512

    4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

  • memory/1852-131-0x0000000007200000-0x0000000007222000-memory.dmp

    Filesize

    136KB

  • memory/1852-130-0x0000000007120000-0x00000000071B2000-memory.dmp

    Filesize

    584KB

  • memory/1852-132-0x0000000007230000-0x0000000007580000-memory.dmp

    Filesize

    3.3MB

  • memory/1852-129-0x00000000070A0000-0x0000000007122000-memory.dmp

    Filesize

    520KB

  • memory/1852-125-0x00000000009B0000-0x00000000009C4000-memory.dmp

    Filesize

    80KB

  • memory/1852-127-0x00000000052C0000-0x00000000052D0000-memory.dmp

    Filesize

    64KB

  • memory/1852-126-0x00000000052C0000-0x00000000052D0000-memory.dmp

    Filesize

    64KB

  • memory/1852-128-0x0000000006D80000-0x0000000006F22000-memory.dmp

    Filesize

    1.6MB

  • memory/2812-172-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/2812-171-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/2812-189-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/2812-170-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/2812-244-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/2812-167-0x0000000000400000-0x00000000004BC000-memory.dmp

    Filesize

    752KB

  • memory/4344-139-0x0000000007F40000-0x0000000007FA6000-memory.dmp

    Filesize

    408KB

  • memory/4344-160-0x0000000007200000-0x0000000007210000-memory.dmp

    Filesize

    64KB

  • memory/4344-161-0x0000000007200000-0x0000000007210000-memory.dmp

    Filesize

    64KB

  • memory/4344-159-0x0000000009720000-0x000000000973A000-memory.dmp

    Filesize

    104KB

  • memory/4344-158-0x000000000A180000-0x000000000A7F8000-memory.dmp

    Filesize

    6.5MB

  • memory/4344-143-0x0000000008960000-0x00000000089D6000-memory.dmp

    Filesize

    472KB

  • memory/4344-142-0x0000000008650000-0x000000000869B000-memory.dmp

    Filesize

    300KB

  • memory/4344-141-0x0000000008620000-0x000000000863C000-memory.dmp

    Filesize

    112KB

  • memory/4344-140-0x0000000008120000-0x0000000008186000-memory.dmp

    Filesize

    408KB

  • memory/4344-138-0x0000000007200000-0x0000000007210000-memory.dmp

    Filesize

    64KB

  • memory/4344-137-0x0000000007200000-0x0000000007210000-memory.dmp

    Filesize

    64KB

  • memory/4344-136-0x0000000007840000-0x0000000007E68000-memory.dmp

    Filesize

    6.2MB

  • memory/4344-135-0x0000000007140000-0x0000000007176000-memory.dmp

    Filesize

    216KB