Analysis

  • max time kernel
    147s
  • max time network
    51s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-04-2024 02:00

General

  • Target

    Crux P2P.exe

  • Size

    4.3MB

  • MD5

    08c716898f568707c4514bbb485142a1

  • SHA1

    b210be49e57c9da57b9e7762ba11023e9a4f0527

  • SHA256

    e96b17d8b68aa6aaa20621c086d9cc4562832c5d8f2cc91e0e5484e1b5be44bc

  • SHA512

    940ac0fb7eee08eba0ecb395920b5814729e2b8e7f9d7ad2a366aaa2561e28659ccb59b81ac304c3d5b1a74d442aa503d025f1cf07c95480291f33ed359c895b

  • SSDEEP

    98304:HZadBHHx3WuEWAYJvO094J1ZcDKxclTQ/3XjUtCLvfHunLoxHVUA/bSGCQOm4bdt:HZQRx3WuuYhOuKaE0PJ/

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops desktop.ini file(s) 4 IoCs
  • Installs/modifies Browser Helper Object 2 TTPs 1 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Crux P2P.exe
    "C:\Users\Admin\AppData\Local\Temp\Crux P2P.exe"
    1⤵
    • Checks computer location settings
    • Drops desktop.ini file(s)
    • Installs/modifies Browser Helper Object
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1608
    • C:\Users\Admin\AppData\Local\Temp\MediaImageServices.exe
      "C:\Users\Admin\AppData\Local\Temp\MediaImageServices.exe" /RegServer
      2⤵
      • Modifies registry class
      PID:5064
    • C:\Users\Admin\AppData\Local\Temp\MediaLibraryBuilder.exe
      "C:\Users\Admin\AppData\Local\Temp\MediaLibraryBuilder.exe" /RegServer
      2⤵
      • Modifies registry class
      PID:4748
    • C:\Users\Admin\AppData\Local\Temp\MediaPlayer.exe
      "C:\Users\Admin\AppData\Local\Temp\MediaPlayer.exe" /RegServer
      2⤵
      • Modifies registry class
      PID:1948
    • C:\Users\Admin\AppData\Local\Temp\UpdateApp.exe
      "C:\Users\Admin\AppData\Local\Temp\UpdateApp.exe" "Crux P2P" "1" "5.8.0" "cruxp2p.com" "false"
      2⤵
        PID:1868
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1608 -s 2452
        2⤵
        • Program crash
        PID:3512
    • C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe
      C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe
      1⤵
        PID:2216
      • C:\Users\Admin\AppData\Local\Temp\MediaLibraryBuilder.exe
        "C:\Users\Admin\AppData\Local\Temp\MediaLibraryBuilder.exe" -Embedding
        1⤵
          PID:3896
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 1608 -ip 1608
          1⤵
            PID:3372
          • C:\Users\Admin\AppData\Local\Temp\MediaImageServices.exe
            "C:\Users\Admin\AppData\Local\Temp\MediaImageServices.exe" -Embedding
            1⤵
              PID:456

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Program Files (x86)\desktop.ini

              Filesize

              174B

              MD5

              5b8a2ba3138573583ff9e0158096ec48

              SHA1

              fdb99bdc4e7016132b9efcefb5bd4c7210958927

              SHA256

              66403205bc86d98b75f2449958f717f2f971fca0d33b0d211f03971484e9b567

              SHA512

              9c329baf537ee23da9fb1bcec4838a70c5776195b42868dac9be21749a0fdb06186c8468c26ef93bdf654996cd620ffe3b9021523ceeda4bd96fcb3d3c5a02ad

            • C:\Users\Admin\AppData\Roaming\Crux P2P\Collections\desktop.ini

              Filesize

              217B

              MD5

              85a624b7f9eed7d7b94d6633cedef278

              SHA1

              c8b7e4559714f5b304769fe5a87cddbba3225232

              SHA256

              790d8f5be6a677ad38f7d7efdb38c843d4ba8f3d50efdd059726111274382a23

              SHA512

              f9e107bf411e2a5f44a5b3713a29cacb7db7d91e40debbc4447ebd3c9842728fe4628c0fcc3c5cea2187a15ced9065a4c203ca04da8da9b74dc38da84d595662

            • C:\Users\Admin\AppData\Roaming\Crux P2P\Data\CruxP2P.db3

              Filesize

              9KB

              MD5

              d134858ac968b33d0092a5ed59af5f52

              SHA1

              060a80429e0af8dcb4543639e2194c7173f7b56a

              SHA256

              32b0d73cbec3880deaa6a13bb8f7b8ed396f86b45a94da394992f5d6fc20d1c5

              SHA512

              cc30e8c8d484ebf516afba0884011a76a2a5b2067305858e514448a5ea5ef4fedb31c49198902105bd6e744b8903b78e505fb5f1e5521912a961945b4f783225

            • C:\Users\Admin\Downloads\desktop.ini

              Filesize

              298B

              MD5

              819c27ae07898f1a5efda4e146dbb174

              SHA1

              24e7bb0390e2c475922c5727d71404a339ac1269

              SHA256

              d5e7d3ffbfeffe8c91236b30b1cd3c4cbb80059d16ff6edf52c2027874e1ebdf

              SHA512

              70618753f2f65544495bae56496a541dfb6f65a61c310e5489660536654a24b0569469c0da207b0287c1ba5f72696607a3a5a3d0ad50de81de74ee18feb18736

            • memory/456-117-0x0000000002360000-0x0000000002370000-memory.dmp

              Filesize

              64KB

            • memory/456-87-0x0000000002360000-0x0000000002370000-memory.dmp

              Filesize

              64KB

            • memory/456-116-0x0000000002360000-0x0000000002370000-memory.dmp

              Filesize

              64KB

            • memory/456-115-0x0000000002360000-0x0000000002370000-memory.dmp

              Filesize

              64KB

            • memory/456-112-0x0000000002360000-0x0000000002370000-memory.dmp

              Filesize

              64KB

            • memory/456-88-0x0000000002360000-0x0000000002370000-memory.dmp

              Filesize

              64KB

            • memory/456-113-0x0000000002360000-0x0000000002370000-memory.dmp

              Filesize

              64KB

            • memory/456-114-0x0000000002360000-0x0000000002370000-memory.dmp

              Filesize

              64KB

            • memory/456-86-0x0000000002360000-0x0000000002370000-memory.dmp

              Filesize

              64KB

            • memory/456-83-0x0000000002360000-0x0000000002370000-memory.dmp

              Filesize

              64KB

            • memory/456-85-0x0000000002360000-0x0000000002370000-memory.dmp

              Filesize

              64KB

            • memory/456-84-0x0000000002360000-0x0000000002370000-memory.dmp

              Filesize

              64KB

            • memory/456-82-0x0000000002360000-0x0000000002370000-memory.dmp

              Filesize

              64KB

            • memory/456-81-0x0000000002360000-0x0000000002370000-memory.dmp

              Filesize

              64KB

            • memory/456-118-0x0000000002360000-0x0000000002370000-memory.dmp

              Filesize

              64KB

            • memory/456-119-0x0000000002360000-0x0000000002370000-memory.dmp

              Filesize

              64KB

            • memory/1608-13-0x0000000074110000-0x00000000743A1000-memory.dmp

              Filesize

              2.6MB

            • memory/1608-5-0x00000000002E0000-0x0000000000774000-memory.dmp

              Filesize

              4.6MB

            • memory/1608-2-0x0000000074D40000-0x0000000074D65000-memory.dmp

              Filesize

              148KB

            • memory/1608-4-0x0000000074DA0000-0x0000000074DCA000-memory.dmp

              Filesize

              168KB

            • memory/1608-38-0x0000000072E00000-0x0000000072E26000-memory.dmp

              Filesize

              152KB

            • memory/1608-8-0x0000000076B80000-0x0000000076BFA000-memory.dmp

              Filesize

              488KB

            • memory/1608-7-0x0000000074E20000-0x0000000074E7D000-memory.dmp

              Filesize

              372KB

            • memory/1608-10-0x0000000010000000-0x0000000010120000-memory.dmp

              Filesize

              1.1MB

            • memory/1608-37-0x0000000072F30000-0x0000000072F62000-memory.dmp

              Filesize

              200KB

            • memory/1608-35-0x0000000073600000-0x0000000073624000-memory.dmp

              Filesize

              144KB

            • memory/1608-34-0x0000000073630000-0x0000000073751000-memory.dmp

              Filesize

              1.1MB

            • memory/1608-33-0x00000000037A0000-0x00000000037D4000-memory.dmp

              Filesize

              208KB

            • memory/1608-31-0x00000000037A0000-0x00000000037D4000-memory.dmp

              Filesize

              208KB

            • memory/1608-6-0x0000000076B80000-0x0000000076BFA000-memory.dmp

              Filesize

              488KB

            • memory/1608-1-0x0000000076B80000-0x0000000076BFA000-memory.dmp

              Filesize

              488KB

            • memory/1608-11-0x0000000074110000-0x00000000743A1000-memory.dmp

              Filesize

              2.6MB

            • memory/1608-0-0x0000000074DD0000-0x0000000074E14000-memory.dmp

              Filesize

              272KB

            • memory/1608-12-0x0000000074110000-0x00000000743A1000-memory.dmp

              Filesize

              2.6MB

            • memory/1608-3-0x0000000074E20000-0x0000000074E7D000-memory.dmp

              Filesize

              372KB

            • memory/1608-9-0x0000000074410000-0x000000007442E000-memory.dmp

              Filesize

              120KB

            • memory/1868-40-0x0000000072590000-0x0000000072B41000-memory.dmp

              Filesize

              5.7MB

            • memory/1868-42-0x0000000001250000-0x0000000001260000-memory.dmp

              Filesize

              64KB

            • memory/1868-41-0x0000000072590000-0x0000000072B41000-memory.dmp

              Filesize

              5.7MB

            • memory/1868-125-0x0000000072590000-0x0000000072B41000-memory.dmp

              Filesize

              5.7MB

            • memory/2216-62-0x000000001AA10000-0x000000001AB46000-memory.dmp

              Filesize

              1.2MB

            • memory/2216-61-0x000000001A300000-0x000000001A6D4000-memory.dmp

              Filesize

              3.8MB

            • memory/2216-58-0x0000000000E00000-0x0000000000E20000-memory.dmp

              Filesize

              128KB