Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240730-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-07-2024 10:53

General

  • Target

    b9c037384eaa82706baf7c3cd5e1550fe9ad24083edeb00e55d9da8198ea6ee3.exe

  • Size

    4.5MB

  • MD5

    57afe7c6eae81f93e3e6a085b6bd7961

  • SHA1

    6af9bb4cb10f0d765cf87b71f5dcfa3c5d7d61f6

  • SHA256

    b9c037384eaa82706baf7c3cd5e1550fe9ad24083edeb00e55d9da8198ea6ee3

  • SHA512

    ebd7a6029b72385d1667fa1013241dfeac19fedf2ccf1303b22105126e5de490f39af4e5a2f3dbaba462b919560fb8a421f3228c49bfb8bc569d9f8c16c40665

  • SSDEEP

    98304:O/KyGgrf/TiG4GR0msmwCiYZHImJyS5qGWxpPr2C9rPZ:MZGgrf6GRFn3a/Sw7pPnrP

Malware Config

Signatures

  • CryptBot

    A C++ stealer distributed widely in bundle with other software.

  • CryptBot payload 14 IoCs
  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b9c037384eaa82706baf7c3cd5e1550fe9ad24083edeb00e55d9da8198ea6ee3.exe
    "C:\Users\Admin\AppData\Local\Temp\b9c037384eaa82706baf7c3cd5e1550fe9ad24083edeb00e55d9da8198ea6ee3.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3636
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\qmxvulwt.vbs"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3712
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\qmxvulwt.vbs"
        3⤵
        • Blocklisted process makes network request
        • System Location Discovery: System Language Discovery
        PID:2096
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\ugtwqmfkf.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4756
      • C:\Users\Admin\AppData\Local\Temp\ugtwqmfkf.exe
        "C:\Users\Admin\AppData\Local\Temp\ugtwqmfkf.exe"
        3⤵
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Checks processor information in registry
        • Suspicious use of FindShellTrayWindow
        PID:1804
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\AppData\Local\Temp\okdllbsejnxg.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Qp7SYQz\ManVYxmtOgW6Z.zip

    Filesize

    40KB

    MD5

    f45625892a1222d1372678bfb5f4ea7b

    SHA1

    1efc46289fe7ea1ff2970195140507cb77ad3311

    SHA256

    8edb52e162ff8f37e8bf2191b393b3b4a6c88bac9ee1701a1d98a0b896ffcbce

    SHA512

    232418da4e01dcacc2ca8e7c637f38d3e248ed247a284c931dca0cde34de8c4719e8a84a541bf91661bf65d188fae7279b43c486415c08f90668e7f2ed768570

  • C:\Users\Admin\AppData\Local\Temp\Qp7SYQz\SlJdHS6ZWv.zip

    Filesize

    40KB

    MD5

    ffa791f78c7f20ae3252d227384d5e1e

    SHA1

    34b547f6cd001574bd66d1820b80cfbfa7fa8422

    SHA256

    8c9fe9eb9bb3d17715d1540cd1f7bc1abdadead5e6f90bacb4d21b6ce34b4131

    SHA512

    3ee1c8afac783b4ebd3dfa91ed13b23ea095f3ee8e1fccb5b0f47630cae4e5f8b693de3ec919e3ec6b0ca58cb458ea17f816944472d0a7151920d72038c0e352

  • C:\Users\Admin\AppData\Local\Temp\Qp7SYQz\_Files\_Information.txt

    Filesize

    7KB

    MD5

    b39c2749dae15bca315003ffa1b61101

    SHA1

    0bc6078934ca8571f2c4c4ea57bdde1e24b40fd2

    SHA256

    a1b43837005f9c3d3fff28c1554e5dd17509352b987633a8dfecaa0360cf9c37

    SHA512

    6f1bbbae84842351088785c16581e55e0f1de3c01640f7d8aa22cada165d150df7418f42decf049c50251ba4b0a176662dd3e2effe0d6ae16249e281bcd14d37

  • C:\Users\Admin\AppData\Local\Temp\Qp7SYQz\_Files\_Screen_Desktop.jpeg

    Filesize

    46KB

    MD5

    15370cfb0f78074bd0fc11ee31e7df85

    SHA1

    80b7981e1166ea0a02d18c51ff14b81a996a1ce7

    SHA256

    b5475d6f2615472f21248900bef2bfd9af35ffbd17cb2b4042def382df5e877d

    SHA512

    43e560ac5016f171eacc799450d6ea93663914028a9a5aa7c4421c83d8d6d55b945ac266410f84f1077937e36731f41b00bb01478b540a7705f4fccf0a4c8c45

  • C:\Users\Admin\AppData\Local\Temp\Qp7SYQz\files_\system_info.txt

    Filesize

    672B

    MD5

    23848003a577abeb3d91f356e632bfea

    SHA1

    05bd8eb46860b8bd8abc1a3fe980cd20ebbd1fb1

    SHA256

    b615bce606c8495b1bf61758f0892eda223a3d8ab4d9688cedce5b02ce2b0d80

    SHA512

    c4a2e016a43e44dbf4633c6a9a5fc2c0637a2eedd3359be0baaf77f7726ba7c330afb914b5ab541e7c0c3aa396d238ef9999b0aaa1f49498e67fca2e2d7454c4

  • C:\Users\Admin\AppData\Local\Temp\Qp7SYQz\files_\system_info.txt

    Filesize

    4KB

    MD5

    5d3fd2a084a21ffffb7a727c3415a1fe

    SHA1

    2308ef915717a27c3a057dd929737c238ff41ef8

    SHA256

    d34aca5f8317ca47a64f09bc039fd8d0bcc8742c57fc69eac1416e45961a45bb

    SHA512

    686a3f4f542d1fbdbcff424ba768587f07322f5e24ebe866e8de88c83b6598bee9b3f221349f74676bc7d42013f51990d3e54e617f35570e67f43ccd355575fa

  • C:\Users\Admin\AppData\Local\Temp\qmxvulwt.vbs

    Filesize

    145B

    MD5

    184f7d1445a59ca56f2d32be1b43d509

    SHA1

    76f715ead42d9a1da91c72816856e1d024f6f783

    SHA256

    ba196708d81cb597298c7d326f7c2228ac6acc07ccb1b44b46b8bf2cdc0cdb8c

    SHA512

    13b3c998749332d553ccff3f12009fb4c298a7538c5cecc0c5ee595db84ac6da4978a06b76bf399606fdcba9044451fe942d52eaa44009ea625ce0d851883bec

  • C:\Users\Admin\AppData\Local\Temp\ugtwqmfkf.exe

    Filesize

    2.7MB

    MD5

    64d3edf1a6cd37e9e2193c0e1fc50220

    SHA1

    9e5863b0e717030db247fa3ff6dead07710d5ab5

    SHA256

    b56d450c7ccbccb915ca8006bfc0fc41037cd850dd799c77275eab397ef61772

    SHA512

    0ff5c9fef715ba203de9c239d53e99baff932e35a03b94f21369410d425f4deed0c4a7f17f6d483ffaee2acf706c031cca62b0f86f31d94c6bf704d996f68abb

  • memory/1804-263-0x00007FF62E350000-0x00007FF62EA27000-memory.dmp

    Filesize

    6.8MB

  • memory/1804-17-0x00007FF62E350000-0x00007FF62EA27000-memory.dmp

    Filesize

    6.8MB

  • memory/1804-289-0x00007FF62E350000-0x00007FF62EA27000-memory.dmp

    Filesize

    6.8MB

  • memory/1804-287-0x00007FF62E350000-0x00007FF62EA27000-memory.dmp

    Filesize

    6.8MB

  • memory/1804-233-0x00007FF62E350000-0x00007FF62EA27000-memory.dmp

    Filesize

    6.8MB

  • memory/1804-283-0x00007FF62E350000-0x00007FF62EA27000-memory.dmp

    Filesize

    6.8MB

  • memory/1804-281-0x00007FF62E350000-0x00007FF62EA27000-memory.dmp

    Filesize

    6.8MB

  • memory/1804-260-0x00007FF62E350000-0x00007FF62EA27000-memory.dmp

    Filesize

    6.8MB

  • memory/1804-279-0x00007FF62E350000-0x00007FF62EA27000-memory.dmp

    Filesize

    6.8MB

  • memory/1804-239-0x00007FF62E350000-0x00007FF62EA27000-memory.dmp

    Filesize

    6.8MB

  • memory/1804-272-0x00007FF62E350000-0x00007FF62EA27000-memory.dmp

    Filesize

    6.8MB

  • memory/1804-243-0x00007FF62E350000-0x00007FF62EA27000-memory.dmp

    Filesize

    6.8MB

  • memory/1804-269-0x00007FF62E350000-0x00007FF62EA27000-memory.dmp

    Filesize

    6.8MB

  • memory/1804-266-0x00007FF62E350000-0x00007FF62EA27000-memory.dmp

    Filesize

    6.8MB

  • memory/1804-258-0x00007FF62E350000-0x00007FF62EA27000-memory.dmp

    Filesize

    6.8MB

  • memory/3636-2-0x00000000005C1000-0x0000000000891000-memory.dmp

    Filesize

    2.8MB

  • memory/3636-0-0x00000000005C0000-0x0000000000CFE000-memory.dmp

    Filesize

    7.2MB

  • memory/3636-255-0x00000000005C1000-0x0000000000891000-memory.dmp

    Filesize

    2.8MB

  • memory/3636-254-0x00000000005C0000-0x0000000000CFE000-memory.dmp

    Filesize

    7.2MB

  • memory/3636-241-0x00000000005C0000-0x0000000000CFE000-memory.dmp

    Filesize

    7.2MB

  • memory/3636-238-0x00000000005C1000-0x0000000000891000-memory.dmp

    Filesize

    2.8MB

  • memory/3636-236-0x00000000005C0000-0x0000000000CFE000-memory.dmp

    Filesize

    7.2MB

  • memory/3636-235-0x00000000005C0000-0x0000000000CFE000-memory.dmp

    Filesize

    7.2MB

  • memory/3636-1-0x0000000077BE4000-0x0000000077BE6000-memory.dmp

    Filesize

    8KB

  • memory/3636-231-0x00000000005C0000-0x0000000000CFE000-memory.dmp

    Filesize

    7.2MB

  • memory/3636-3-0x00000000005C0000-0x0000000000CFE000-memory.dmp

    Filesize

    7.2MB