Analysis
-
max time kernel
3s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 00:11
Static task
static1
Behavioral task
behavioral1
Sample
213147990af1e09de2b30611d38b75d9.exe
Resource
win7-20231215-en
General
-
Target
213147990af1e09de2b30611d38b75d9.exe
-
Size
574KB
-
MD5
213147990af1e09de2b30611d38b75d9
-
SHA1
6b8a643c9abd57c2a2e229444b77fd1c50bc2f6d
-
SHA256
0ebd6fcc7ab83bc44c14457c54b90674bfc40fbcc8af8154a1b3e240b96c665c
-
SHA512
1dc46b87314b225dac565405ed6760418c60c5efb2d698c21858c29a605c5095b8be20cc7b1f5e65e70086224a498ba35937d215d96c1387f6ebb7e068bc95e0
-
SSDEEP
12288:wsIC3py6OpyvRkv2Kcixakyh9O0bmp52vwXljd2c4eXqcB8woO:Skpopyv2v2KcickakfjdyeXo
Malware Config
Extracted
cryptbot
hairdx22.top
morqoi02.top
-
payload_url
http://zelpdo03.top/download.php?file=lv.exe
Signatures
-
CryptBot payload 4 IoCs
resource yara_rule behavioral1/memory/2528-2-0x0000000000220000-0x00000000002C0000-memory.dmp family_cryptbot behavioral1/memory/2528-3-0x0000000000400000-0x0000000002CC7000-memory.dmp family_cryptbot behavioral1/memory/2528-221-0x0000000000400000-0x0000000002CC7000-memory.dmp family_cryptbot behavioral1/memory/2528-225-0x0000000000220000-0x00000000002C0000-memory.dmp family_cryptbot -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 213147990af1e09de2b30611d38b75d9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 213147990af1e09de2b30611d38b75d9.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2528 213147990af1e09de2b30611d38b75d9.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5880397982444697de3d34f23dec5d8dc
SHA1ff656dde221a52de0b407cc3084120183e9a2491
SHA256c5c3b18a386222698be9f83887da2094d63f18a31fb6cf5cb5219b66f4993cba
SHA5124fb018ab0246c4723cd815ee5cde87392992c39897468b3e2e3f0f7b2630e6d52d88ace7bfbc523e00bf11305d8a7ec1c801d15a529a00fc344c6f4c860b874f
-
Filesize
3KB
MD5b9c6f384152e24ededa89ee123551553
SHA1370453dcf1d3aecda27e0cc04f3827e2e1b4b9c5
SHA256afbdd9c32a06895e4d521f5ad813d0e839698ae1c5edcccca2c567448fcad154
SHA512efd357bda25e853fd1460b3df3c4b39263f867f0b9c9814cbd74bd8a2f149238bc6fe2d2822c080bdfcc1a72540a8e44aa80620e235e484346c95cfa503b9332
-
Filesize
3KB
MD5fdd429d81eb1f2c6fe3e58285a9b7aca
SHA1d763f9f26c23ae1dbc368b0c577fd956d38c3474
SHA256f7c20167f0c10aed6acf70e47443b9ef157e6c062a75384a31e14b14d6194d0d
SHA5123abc0b5c804c28e877e0f4dd0685b27db8f311b087d58bca32fe4e57b181302dc04a7b1169860a124975f505f948c74e80b5363948d332a085026cc0e0e073ac
-
Filesize
4KB
MD5772cb25fe0792a4562215d49bd74d095
SHA15cbca78190dc1df227837d922d1b8a4b4fc6ec9b
SHA256bb5012f56a376e50815076cd824be4a3ca45f3cf4b4d4931b3c85d65de92f88d
SHA512084ad062185c3182dbd7aeee821cb195f9e883f80b2bbeeec8fa36bfe35654eb06becb3253a9fa0720cadd7e0cc2fcf5f4ed2a0ada62cce5580a1b0ba26cf5c2
-
Filesize
46KB
MD58b35790d1350f7b597d9c46858ef113a
SHA155117c42e3762c65f74f4e855754e96795e82cad
SHA2564282f30ffeb9744c09555ba3a34e1472fc2d33a753a22c281a8b66ea6b036b6e
SHA512e34c4de5c10cc78ca074a5b47e67bdf4b76f149295e05a82020575a0648a62ec11f1782819c51cd7f07814210da3bc7c8cf82d3fc84652b3b0d46d911c0efd41
-
Filesize
39KB
MD51780deeb01b48856e31ff9774c1a41d2
SHA16e23dc5db3fe41ae0806fcef885bccef353e03a9
SHA25660c33b2a4a1e0c5cacf3d1b02f10a65be477095a7b0f58a4409b05de97f0b9c7
SHA512268ddfd997cadde55e3bb1d40679c0c907da4f6fd2bd32870b9f78fabe25a3495e99a8173ef7d95e7c9aa7b71fd3b5d06b5110fff3e3aa65f404766e9a29b547
-
Filesize
1KB
MD5246719831df7b19b20b4aeda6bf3a6f1
SHA1f40cfb847c288f6988539d4d3f443978b85749d4
SHA256fb8bab782d99d8c8bb151f6163dac26d5aaa61452aac5d2f7cec49b51fd3bed9
SHA512427b42e75d7182ff467b33e9ac8ad1a137621dbd6bd3dfb2db5a7c0a7cef7ee8dec7903602140b8da99827e2634e255d8655d85e1b600f8da11eec05090dbe28
-
Filesize
1KB
MD525b202070c2cbf4c492bae40914340c6
SHA132b2a42114d330683b4d5c8fee40fb1141b7e378
SHA256550c0f93094ea8ef772e3894469ee9510ad12032f5f9e4573ece5757a16b06cf
SHA5120226fc285e575c7bba4041134979e2596cb0d5116fa40642c36de4f5fb00d0ae9656dd7a23fbbe603b34af3068cdd57ac91557d1484b543ddba38d7d577b4f44
-
Filesize
2KB
MD54f96bd1d08dbd18f3910f3d8a52ec856
SHA1a9219c024e64ef025589e6ea10e13b879feecfcc
SHA256fd29ade92f6ffd290a22cd222f18ecd4cab09b49adefab42c1f4231c0aac176d
SHA5126dde254cecd8cb9cfc77d9810d550c69e8fa2f0d4da35c202343f30bbe29749c03b4ff76a0b3ef29c633e864b9b6f226bd42908531bbd68e7126da7820cf860b
-
Filesize
3KB
MD596a62a9601ca5896e71b8d7459eea4e8
SHA1bc0d170d8a8cec4a0d956cff2d7b995902bf9340
SHA2562c27bb136968d8b2fe632426a27db94dc32ce90d81f078b35cfaea34fcd4a59d
SHA512c9d393aca665b56991dfc7da22f249b2862747bcd24d2e3691fafdbe42ca717d172959faece2ea0530b7e51bce0382e9bb2c97edbd12d74de3f08166f066e384
-
Filesize
3KB
MD564f59fea53485f653c5ae39490d7a87b
SHA1f9a4b36345cec25694dc2072929f94447f910b14
SHA25619c1b0c70b994d2c185fb6f1e59d8bf6b3404788e52e5ec729b106922e873509
SHA51281138ace643cbe6958517ed0943ba796688a516f40298d1394e0d30fb5b9747cdfe32dce2bc58fa91ef0676fcc9d30a14906a983202673215f1fe1156a696323
-
Filesize
4KB
MD57bdf98e4e046e8c021be483ab437202c
SHA12cb21f2e09ffdc956de76ff69d8d364a57d7f364
SHA25679c8459a74f9c52e583317847cf3b94f3753db4dcbaea354a388898ba15c2b9e
SHA5126f0542a2f54f625d76fb81d0c03962743ed51a9c669b108862062387d8ff26de0fa4821a0f393d6b5d9948926e6db5fa1d39efcc6608edccb8bf7ce37162a886