Analysis
-
max time kernel
151s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2023 07:04
Behavioral task
behavioral1
Sample
Crunchyrollp.exe
Resource
win7-20230220-en
General
-
Target
Crunchyrollp.exe
-
Size
9.2MB
-
MD5
e7d1a006917f10e419f0e506a98e385b
-
SHA1
14b28ce35fbeafe10d629ffd7a12ac017876bfda
-
SHA256
c66f10a5fc23b02ad11b77786c17ea54f68912156cafb227bfef5aab69b38b91
-
SHA512
af34bcd208d9e3e2a1c1af2147bff2cc6a44e1008181410e4ba377e0d902cc7dc0a077d575c167dec059fa27af6123e3690512934b19d23618e51794b41af6b6
-
SSDEEP
98304:HD6asPKgZViQqyYiwdLTgmOSjr4Wz3Wch+jMnlL0jaDvLZsDawHm+tiyOweb8xI1:j6asPZ3LqjxFBz+uD19wG+tivwebr3n
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
Crunchyrollp.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Crunchyrollp.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Crunchyrollp.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Crunchyrollp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Crunchyrollp.exe -
Loads dropped DLL 5 IoCs
Processes:
Crunchyrollp.exepid process 3240 Crunchyrollp.exe 3240 Crunchyrollp.exe 3240 Crunchyrollp.exe 3240 Crunchyrollp.exe 3240 Crunchyrollp.exe -
Obfuscated with Agile.Net obfuscator 3 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral2/memory/3240-133-0x0000000000400000-0x0000000000660000-memory.dmp agile_net behavioral2/memory/3240-134-0x0000000000400000-0x0000000000612000-memory.dmp agile_net behavioral2/memory/3240-153-0x0000000000400000-0x0000000000660000-memory.dmp agile_net -
Processes:
resource yara_rule behavioral2/memory/3240-138-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral2/memory/3240-144-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral2/memory/3240-147-0x0000000005780000-0x0000000005D94000-memory.dmp themida behavioral2/memory/3240-149-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral2/memory/3240-150-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral2/memory/3240-151-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral2/memory/3240-152-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral2/memory/3240-154-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral2/memory/3240-155-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral2/memory/3240-156-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral2/memory/3240-176-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral2/memory/3240-183-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral2/memory/3240-194-0x0000000010000000-0x0000000010C35000-memory.dmp themida behavioral2/memory/3240-224-0x0000000010000000-0x0000000010C35000-memory.dmp themida -
Processes:
Crunchyrollp.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Crunchyrollp.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
Crunchyrollp.exepid process 3240 Crunchyrollp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 20 IoCs
Processes:
Crunchyrollp.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff Crunchyrollp.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Crunchyrollp.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Crunchyrollp.exe Set value (str) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" Crunchyrollp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Crunchyrollp.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Crunchyrollp.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Crunchyrollp.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff Crunchyrollp.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Crunchyrollp.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Crunchyrollp.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings Crunchyrollp.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell Crunchyrollp.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Crunchyrollp.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Crunchyrollp.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e80922b16d365937a46956b92703aca08af0000 Crunchyrollp.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 Crunchyrollp.exe Set value (data) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Crunchyrollp.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Crunchyrollp.exe Set value (int) \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" Crunchyrollp.exe Key created \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Crunchyrollp.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Crunchyrollp.exepid process 3240 Crunchyrollp.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Crunchyrollp.exepid process 3240 Crunchyrollp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Crunchyrollp.exe"C:\Users\Admin\AppData\Local\Temp\Crunchyrollp.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.dbFilesize
28KB
MD5a8ea5c4087f34b0a163286016cd2a114
SHA1cda4061032f0a0d9783848e6430886dbf5beb21d
SHA2563f2d872046d29cfb7a260f080092409aa133816752826c136c44a3c7f129f86f
SHA51221e03d19c3c9925e391a1adb616a27497a620b0781e775c1f232741a816eaa8e15994a9be1b0ced22166e0096ca695644630e6e67335e6c4bab1a175a3e4ef77
-
C:\Users\Admin\AppData\Local\Temp\evb1EF4.tmpFilesize
1KB
MD5e19f1ab63874138c99d0047c27d478d8
SHA192290bd4c5c76da2b9cd7eeddc1283e7334ac968
SHA2564dd8c4ac0e9b213fa9d160f893b170054934e43c9f9d58f5da5193355422bd6a
SHA512cc30d9bfadec6050e4ab2e866b60fb67ce48968d1ae5de8f2fcbe40b048a418cc9cd00282878282744dd14150303d173a65e782c0ad314afd53c3ef76025d206
-
C:\Users\Admin\AppData\Local\Temp\evb1F33.tmpFilesize
1KB
MD5e19f1ab63874138c99d0047c27d478d8
SHA192290bd4c5c76da2b9cd7eeddc1283e7334ac968
SHA2564dd8c4ac0e9b213fa9d160f893b170054934e43c9f9d58f5da5193355422bd6a
SHA512cc30d9bfadec6050e4ab2e866b60fb67ce48968d1ae5de8f2fcbe40b048a418cc9cd00282878282744dd14150303d173a65e782c0ad314afd53c3ef76025d206
-
C:\Users\Admin\AppData\Local\Temp\evb20DA.tmpFilesize
1KB
MD526fc5802d3da1539a5b4a4e9d1c0be94
SHA14451ad10ddd3a9910f3706e957ce32ae142fbf58
SHA256d1781882a8f4ed09d0f0237271a72522b7679aca3112755c75f9b60e5db18840
SHA5125dd81590049e6574e3e1325b637a4f2fb62bfc77635f8ad86b6125ff2a91f04a88182cc896e855b3054ed281545c6985e0db05c36ed55f0819ed5260ab27b44c
-
C:\Users\Admin\AppData\Local\Temp\evb236B.tmpFilesize
1KB
MD526fc5802d3da1539a5b4a4e9d1c0be94
SHA14451ad10ddd3a9910f3706e957ce32ae142fbf58
SHA256d1781882a8f4ed09d0f0237271a72522b7679aca3112755c75f9b60e5db18840
SHA5125dd81590049e6574e3e1325b637a4f2fb62bfc77635f8ad86b6125ff2a91f04a88182cc896e855b3054ed281545c6985e0db05c36ed55f0819ed5260ab27b44c
-
C:\Users\Admin\AppData\Local\Temp\evbF524.tmpFilesize
1KB
MD592bfcb568bb0a74869f134d6ed8053c0
SHA145fb0817db5abdee31fef3289fa0c5bcf039ef9c
SHA256eb84e17ff1e3c68294a89e1786a8484ba3ce049b494973399438ef8339d3fc95
SHA512b82afc7bf48394cd1dce743220e007a82a3f8e0f9b689e81821b9058b3158e4c275d6f7c2816ba353b589b14bc6f7d05999d64b80ebff7e1e403e892690a1500
-
memory/3240-150-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/3240-144-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/3240-149-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/3240-133-0x0000000000400000-0x0000000000660000-memory.dmpFilesize
2.4MB
-
memory/3240-151-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/3240-153-0x0000000000400000-0x0000000000660000-memory.dmpFilesize
2.4MB
-
memory/3240-152-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/3240-154-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/3240-155-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/3240-156-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/3240-157-0x0000000073040000-0x00000000730C9000-memory.dmpFilesize
548KB
-
memory/3240-162-0x0000000002E60000-0x0000000002E7C000-memory.dmpFilesize
112KB
-
memory/3240-146-0x00000000FFC50000-0x00000000FFE3F000-memory.dmpFilesize
1.9MB
-
memory/3240-145-0x0000000005440000-0x0000000005521000-memory.dmpFilesize
900KB
-
memory/3240-167-0x00000000060C0000-0x0000000006152000-memory.dmpFilesize
584KB
-
memory/3240-147-0x0000000005780000-0x0000000005D94000-memory.dmpFilesize
6.1MB
-
memory/3240-171-0x0000000005530000-0x0000000005556000-memory.dmpFilesize
152KB
-
memory/3240-138-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/3240-177-0x0000000002E60000-0x0000000002E7C000-memory.dmpFilesize
112KB
-
memory/3240-176-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/3240-178-0x0000000005530000-0x0000000005556000-memory.dmpFilesize
152KB
-
memory/3240-179-0x0000000006160000-0x0000000006704000-memory.dmpFilesize
5.6MB
-
memory/3240-180-0x0000000005440000-0x0000000005521000-memory.dmpFilesize
900KB
-
memory/3240-181-0x0000000005570000-0x0000000005580000-memory.dmpFilesize
64KB
-
memory/3240-183-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/3240-186-0x0000000002E60000-0x0000000002E7C000-memory.dmpFilesize
112KB
-
memory/3240-187-0x0000000005530000-0x0000000005556000-memory.dmpFilesize
152KB
-
memory/3240-188-0x0000000005570000-0x0000000005580000-memory.dmpFilesize
64KB
-
memory/3240-194-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB
-
memory/3240-134-0x0000000000400000-0x0000000000612000-memory.dmpFilesize
2.1MB
-
memory/3240-224-0x0000000010000000-0x0000000010C35000-memory.dmpFilesize
12.2MB