Analysis
-
max time kernel
151s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
07-05-2023 07:04
Behavioral task
behavioral1
Sample
Crunchyrollp.exe
Resource
win7-20230220-en
General
-
Target
Crunchyrollp.exe
-
Size
9.2MB
-
MD5
e7d1a006917f10e419f0e506a98e385b
-
SHA1
14b28ce35fbeafe10d629ffd7a12ac017876bfda
-
SHA256
c66f10a5fc23b02ad11b77786c17ea54f68912156cafb227bfef5aab69b38b91
-
SHA512
af34bcd208d9e3e2a1c1af2147bff2cc6a44e1008181410e4ba377e0d902cc7dc0a077d575c167dec059fa27af6123e3690512934b19d23618e51794b41af6b6
-
SSDEEP
98304:HD6asPKgZViQqyYiwdLTgmOSjr4Wz3Wch+jMnlL0jaDvLZsDawHm+tiyOweb8xI1:j6asPZ3LqjxFBz+uD19wG+tivwebr3n
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
Crunchyrollp.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Crunchyrollp.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Crunchyrollp.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Crunchyrollp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Crunchyrollp.exe -
Obfuscated with Agile.Net obfuscator 3 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/1316-54-0x0000000000400000-0x0000000000660000-memory.dmp agile_net behavioral1/memory/1316-55-0x0000000000400000-0x0000000000612000-memory.dmp agile_net behavioral1/memory/1316-96-0x0000000000400000-0x0000000000660000-memory.dmp agile_net -
Processes:
resource yara_rule behavioral1/memory/1316-58-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral1/memory/1316-65-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral1/memory/1316-67-0x00000000052C0000-0x00000000058D4000-memory.dmp themida behavioral1/memory/1316-68-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral1/memory/1316-69-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral1/memory/1316-70-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral1/memory/1316-71-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral1/memory/1316-72-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral1/memory/1316-73-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral1/memory/1316-93-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral1/memory/1316-97-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral1/memory/1316-99-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral1/memory/1316-103-0x0000000005C00000-0x0000000005C26000-memory.dmp themida behavioral1/memory/1316-110-0x0000000010000000-0x0000000010C35000-memory.dmp themida -
Processes:
Crunchyrollp.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Crunchyrollp.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
Crunchyrollp.exepid process 1316 Crunchyrollp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 20 IoCs
Processes:
Crunchyrollp.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags Crunchyrollp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_TopViewVersion = "0" Crunchyrollp.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Crunchyrollp.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff Crunchyrollp.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Crunchyrollp.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_Classes\Local Settings Crunchyrollp.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell Crunchyrollp.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Crunchyrollp.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f4225481e03947bc34db131e946b44c8dd50000 Crunchyrollp.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Crunchyrollp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_FolderType = "{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}" Crunchyrollp.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Crunchyrollp.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 9e0000001a00eebbfe23000010007db10d7bd29c934a973346cc89022e7c00002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020002a0000000000efbe7e47b3fbe4c93b4ba2bad3f5d3cd46f98207ba827a5b6945b5d7ec83085f08cc20002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020000000 Crunchyrollp.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Crunchyrollp.exe Set value (int) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" Crunchyrollp.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg Crunchyrollp.exe Key created \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Crunchyrollp.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Crunchyrollp.exe Set value (data) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff Crunchyrollp.exe Set value (str) \REGISTRY\USER\S-1-5-21-2647223082-2067913677-935928954-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_TopViewID = "{82BA0782-5B7A-4569-B5D7-EC83085F08CC}" Crunchyrollp.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Crunchyrollp.exepid process 1316 Crunchyrollp.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
Processes:
Crunchyrollp.exepid process 1316 Crunchyrollp.exe 1316 Crunchyrollp.exe 1316 Crunchyrollp.exe 1316 Crunchyrollp.exe 1316 Crunchyrollp.exe 1316 Crunchyrollp.exe 1316 Crunchyrollp.exe 1316 Crunchyrollp.exe 1316 Crunchyrollp.exe 1316 Crunchyrollp.exe 1316 Crunchyrollp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Crunchyrollp.exe"C:\Users\Admin\AppData\Local\Temp\Crunchyrollp.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1316-54-0x0000000000400000-0x0000000000660000-memory.dmpFilesize
2.4MB
-
memory/1316-55-0x0000000000400000-0x0000000000612000-memory.dmpFilesize
2.1MB
-
memory/1316-58-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/1316-64-0x00000000FFE00000-0x00000000FFFA7000-memory.dmpFilesize
1.7MB
-
memory/1316-65-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/1316-66-0x0000000002860000-0x0000000002941000-memory.dmpFilesize
900KB
-
memory/1316-67-0x00000000052C0000-0x00000000058D4000-memory.dmpFilesize
6.1MB
-
memory/1316-68-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/1316-69-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/1316-70-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/1316-71-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/1316-72-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/1316-73-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/1316-74-0x0000000074120000-0x00000000741A0000-memory.dmpFilesize
512KB
-
memory/1316-78-0x0000000004FA0000-0x0000000004FBC000-memory.dmpFilesize
112KB
-
memory/1316-84-0x0000000005C00000-0x0000000005C26000-memory.dmpFilesize
152KB
-
memory/1316-88-0x0000000004FA0000-0x0000000004FBC000-memory.dmpFilesize
112KB
-
memory/1316-89-0x0000000005C00000-0x0000000005C26000-memory.dmpFilesize
152KB
-
memory/1316-90-0x0000000005080000-0x00000000050C0000-memory.dmpFilesize
256KB
-
memory/1316-91-0x0000000007DB0000-0x0000000007DB1000-memory.dmpFilesize
4KB
-
memory/1316-93-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/1316-96-0x0000000000400000-0x0000000000660000-memory.dmpFilesize
2.4MB
-
memory/1316-97-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/1316-99-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/1316-102-0x0000000004FA0000-0x0000000004FBC000-memory.dmpFilesize
112KB
-
memory/1316-103-0x0000000005C00000-0x0000000005C26000-memory.dmpFilesize
152KB
-
memory/1316-104-0x0000000005080000-0x00000000050C0000-memory.dmpFilesize
256KB
-
memory/1316-110-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB