Overview
overview
10Static
static
10ABO.exe
windows7-x64
8ABO.exe
windows10-2004-x64
8ABO.exe
windows7-x64
8ABO.exe
windows10-2004-x64
10Adobe.exe
windows7-x64
8Adobe.exe
windows10-2004-x64
10CGserver.exe
windows7-x64
10CGserver.exe
windows10-2004-x64
10COON.exe
windows7-x64
10COON.exe
windows10-2004-x64
8FFA.exe
windows7-x64
10FFA.exe
windows10-2004-x64
8FIle Rustyz bot.exe
windows7-x64
8FIle Rustyz bot.exe
windows10-2004-x64
8FrostBot v1.exe
windows7-x64
10FrostBot v1.exe
windows10-2004-x64
10Google.exe
windows7-x64
10Google.exe
windows10-2004-x64
10MORPH_9359...79.exe
windows7-x64
3MORPH_9359...79.exe
windows10-2004-x64
3Mycrypt.exe
windows7-x64
8Mycrypt.exe
windows10-2004-x64
10PortChecker.exe
windows7-x64
8PortChecker.exe
windows10-2004-x64
10R.exe
windows7-x64
10R.exe
windows10-2004-x64
10RSBOT.exe
windows7-x64
RSBOT.exe
windows10-2004-x64
Rustyz.exe
windows7-x64
8Rustyz.exe
windows10-2004-x64
10Rustyzzbot.exe
windows7-x64
8Rustyzzbot.exe
windows10-2004-x64
1Analysis
-
max time kernel
4s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2024 07:05
Behavioral task
behavioral1
Sample
ABO.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ABO.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
ABO.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
ABO.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Adobe.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Adobe.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
CGserver.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
CGserver.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
COON.exe
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
COON.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
FFA.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
FFA.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
FIle Rustyz bot.exe
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
FIle Rustyz bot.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral15
Sample
FrostBot v1.exe
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
FrostBot v1.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
Google.exe
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
Google.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
MORPH_93594C2E8879.exe
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
MORPH_93594C2E8879.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral21
Sample
Mycrypt.exe
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
Mycrypt.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
PortChecker.exe
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
PortChecker.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
R.exe
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
R.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral27
Sample
RSBOT.exe
Resource
win7-20231215-en
Behavioral task
behavioral28
Sample
RSBOT.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral29
Sample
Rustyz.exe
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
Rustyz.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral31
Sample
Rustyzzbot.exe
Resource
win7-20231215-en
Behavioral task
behavioral32
Sample
Rustyzzbot.exe
Resource
win10v2004-20231222-en
General
-
Target
Mycrypt.exe
-
Size
228KB
-
MD5
a35e683f7392d7aa6be1ac5d325a0584
-
SHA1
7b2a3dfd0579ec4a9f61e45994a48881ebb91b49
-
SHA256
85fac218aabc9a6d08380d6f4fbe07818c5f7c8dc1f630bb849ab5681c83d7de
-
SHA512
7c94c1f19f793d7efe251d9c0c4df900a10b8b85a36da9c883fce2b511f5f65d107d09be777efa92a3be6c0bdd38c302acd024ee48cf836889f79dfabb069470
-
SSDEEP
3072:R26et7TW3+lXSittze7GjsZCc8dexm1qX2Gqfkz297vslPCTjUB9LQdItu:R2BTW6ji7ZCc8dMOqX2Gb29AlPn9Mx
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Users\\Admin\\AppData\\Roaming\\spoolsv.exe\"" Mycrypt.exe -
Modifies Windows Firewall 1 TTPs 1 IoCs
pid Process 4808 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 3620 spoolsv.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\spoolsv.exe\"" Mycrypt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MSWUpdate = "\"C:\\Users\\Admin\\AppData\\Roaming\\spoolsv.exe\"" Mycrypt.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4816 set thread context of 1536 4816 Mycrypt.exe 47 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1536 Mycrypt.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4816 wrote to memory of 1536 4816 Mycrypt.exe 47 PID 4816 wrote to memory of 1536 4816 Mycrypt.exe 47 PID 4816 wrote to memory of 1536 4816 Mycrypt.exe 47 PID 4816 wrote to memory of 1536 4816 Mycrypt.exe 47 PID 4816 wrote to memory of 1536 4816 Mycrypt.exe 47 PID 4816 wrote to memory of 1536 4816 Mycrypt.exe 47 PID 4816 wrote to memory of 1536 4816 Mycrypt.exe 47 PID 4816 wrote to memory of 1536 4816 Mycrypt.exe 47 PID 1536 wrote to memory of 4808 1536 Mycrypt.exe 93 PID 1536 wrote to memory of 4808 1536 Mycrypt.exe 93 PID 1536 wrote to memory of 4808 1536 Mycrypt.exe 93 PID 1536 wrote to memory of 3620 1536 Mycrypt.exe 94 PID 1536 wrote to memory of 3620 1536 Mycrypt.exe 94 PID 1536 wrote to memory of 3620 1536 Mycrypt.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\Mycrypt.exe"C:\Users\Admin\AppData\Local\Temp\Mycrypt.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\Mycrypt.exe"C:\Users\Admin\AppData\Local\Temp\Mycrypt.exe"2⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\spoolsv.exe" CityScape Enable3⤵
- Modifies Windows Firewall
PID:4808
-
-
C:\Users\Admin\AppData\Roaming\spoolsv.exe/d C:\Users\Admin\AppData\Local\Temp\Mycrypt.exe3⤵
- Executes dropped EXE
PID:3620 -
C:\Users\Admin\AppData\Roaming\spoolsv.exeC:\Users\Admin\AppData\Roaming\spoolsv.exe /d C:\Users\Admin\AppData\Local\Temp\Mycrypt.exe4⤵PID:4440
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5e496bf4e4988e5bb13244469e790fe07
SHA1ac77df1729fee10693bca2ec7171eef7e8492501
SHA2567dc863d1cbab09018b441a1714f1fbd448ed3d957659eb66d3a8929f64cb5b1c
SHA5123dfe0eb3102ffc7b36b754415460daca2b062ab162d916cfa461afc70b1f2a019fcd435aeddf49c68b163e2725391a1a490e6e259c7a7a758ac73086adb905e7
-
Filesize
49KB
MD58550e925e0c90f1c179903631019376c
SHA18127185134b984c3b87fe81b51b4e97e896534a3
SHA256924408df04cb8b4cd57c5975770eefc04b94f2aef5b43ae0e6112dee8944107c
SHA51253de216449a9c18e5d3ee78df0e898ff33c1e4d84f0199990a451cc124373fb3796072be6f69aa0ccc5a4734870e669485871f560883360914b59428e6f63e4a
-
Filesize
43KB
MD59650735ad5c916a85f013d27edc4e283
SHA10deb426763bf6629b75ad4b678e2fb31a00fa2cf
SHA256ba4a298838c3268325672ef1ea3c154322da83a7af9bf69f333318afeb696f01
SHA512b79273cd09ed7feb46d6dce28d4fafa3e526149711456ab8e05cd4cd8311d2943868bc604589ccc198b95389a4b43dc22537b884dcf455630098bcfcc207f36e
-
Filesize
31KB
MD5f7e385378fe48338ac59c328555387b5
SHA1254e0c79898298733ec40f9a008cb08a38f6cd9f
SHA25678d8d494a34f3d938b3acc41732195286d86404cdee4531878799a5bb3f16f94
SHA5124f604c29c67ed531fa0395e08ea71a308c8fdcbd11f876345e3180fa14ed9d33b61aa6c60e11ed6647eed785a8b5e688a715e05bb3ed728b876661d03681be63