Overview
overview
10Static
static
3Vedani-Cry...er.zip
windows7-x64
1Vedani-Cry...er.zip
windows10-2004-x64
1Vedani-Cry...ICENSE
windows7-x64
1Vedani-Cry...ICENSE
windows10-2004-x64
1Vedani-Cry...DME.md
windows7-x64
3Vedani-Cry...DME.md
windows10-2004-x64
3Vedani-Cry...al.mp4
windows7-x64
1Vedani-Cry...al.mp4
windows10-2004-x64
6Vedani-Cry...er.exe
windows7-x64
7Vedani-Cry...er.exe
windows10-2004-x64
10test.pyc
windows7-x64
3test.pyc
windows10-2004-x64
3Vedani-Cry...UI.dll
windows7-x64
1Vedani-Cry...UI.dll
windows10-2004-x64
1Vedani-Cry...on.exe
windows7-x64
9Vedani-Cry...on.exe
windows10-2004-x64
10Vedani-Cry...ce.exe
windows7-x64
1Vedani-Cry...ce.exe
windows10-2004-x64
1Analysis
-
max time kernel
16s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
01-09-2024 14:03
Behavioral task
behavioral1
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter.zip
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter/LICENSE
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter/LICENSE
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter/README.md
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter/README.md
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter/Vedani-Crypter/Tutorial.mp4
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter/Vedani-Crypter/Tutorial.mp4
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter/Vedani-Crypter/Vedani-Crypter.exe
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter/Vedani-Crypter/Vedani-Crypter.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
test.pyc
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
test.pyc
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter/Vedani-Crypter/XanderUI.dll
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter/Vedani-Crypter/XanderUI.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter/Vedani-Crypter/libs/obsfucation.exe
Resource
win7-20240705-en
Behavioral task
behavioral16
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter/Vedani-Crypter/libs/obsfucation.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter/Vedani-Crypter/libs/source.exe
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
Vedani-Crypter-Lifetime-Activated-vedani-crypter/Vedani-Crypter/libs/source.exe
Resource
win10v2004-20240802-en
General
-
Target
Vedani-Crypter-Lifetime-Activated-vedani-crypter/Vedani-Crypter/libs/obsfucation.exe
-
Size
5.6MB
-
MD5
612173309c257f2385cdc05c2f8f4ecc
-
SHA1
e27c24d9a54df063a2cc22e687c9e5f08e0181cb
-
SHA256
c9a0aea64ee81d3914980c968f2da7e45b17d008e81576b25fbc3c8415d1d899
-
SHA512
79dad7c537b6573da25627c9379a562db337040c1f845e7cdb5cebe27c232f27476e2ab356353c571b617723aac61c869ebc1758615b32cad87fbfac1deb9d8b
-
SSDEEP
98304:52Zl27OuKr+gvhf2U9Nzm31PMoslkqXf0FvUcwti78OqJ7TPBvc8X6Uc:5fOuK6mn9NzgMoYkSIvUcwti7TQlvciE
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Deletes itself 1 IoCs
pid Process 2808 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2920 Update.exe -
Loads dropped DLL 2 IoCs
pid Process 1496 obsfucation.exe 2920 Update.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\ChromeUpdater = "C:\\Users\\Admin\\AppData\\Roaming\\GoogleChromeUpdateLogs\\Update.exe" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 6 raw.githubusercontent.com 7 raw.githubusercontent.com 10 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2708 tasklist.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Update.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2392 timeout.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 2508 reg.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1496 obsfucation.exe 1496 obsfucation.exe 1496 obsfucation.exe 2920 Update.exe 2920 Update.exe 2920 Update.exe 2920 Update.exe 2920 Update.exe 2920 Update.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1496 obsfucation.exe Token: SeDebugPrivilege 2708 tasklist.exe Token: SeDebugPrivilege 2920 Update.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2920 Update.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1496 wrote to memory of 2808 1496 obsfucation.exe 31 PID 1496 wrote to memory of 2808 1496 obsfucation.exe 31 PID 1496 wrote to memory of 2808 1496 obsfucation.exe 31 PID 2808 wrote to memory of 2708 2808 cmd.exe 33 PID 2808 wrote to memory of 2708 2808 cmd.exe 33 PID 2808 wrote to memory of 2708 2808 cmd.exe 33 PID 2808 wrote to memory of 2700 2808 cmd.exe 34 PID 2808 wrote to memory of 2700 2808 cmd.exe 34 PID 2808 wrote to memory of 2700 2808 cmd.exe 34 PID 2808 wrote to memory of 2392 2808 cmd.exe 35 PID 2808 wrote to memory of 2392 2808 cmd.exe 35 PID 2808 wrote to memory of 2392 2808 cmd.exe 35 PID 2808 wrote to memory of 2920 2808 cmd.exe 36 PID 2808 wrote to memory of 2920 2808 cmd.exe 36 PID 2808 wrote to memory of 2920 2808 cmd.exe 36 PID 2920 wrote to memory of 3064 2920 Update.exe 37 PID 2920 wrote to memory of 3064 2920 Update.exe 37 PID 2920 wrote to memory of 3064 2920 Update.exe 37 PID 3064 wrote to memory of 2508 3064 cmd.exe 39 PID 3064 wrote to memory of 2508 3064 cmd.exe 39 PID 3064 wrote to memory of 2508 3064 cmd.exe 39 PID 2920 wrote to memory of 2152 2920 Update.exe 40 PID 2920 wrote to memory of 2152 2920 Update.exe 40 PID 2920 wrote to memory of 2152 2920 Update.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\Vedani-Crypter-Lifetime-Activated-vedani-crypter\Vedani-Crypter\libs\obsfucation.exe"C:\Users\Admin\AppData\Local\Temp\Vedani-Crypter-Lifetime-Activated-vedani-crypter\Vedani-Crypter\libs\obsfucation.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpB165.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpB165.tmp.bat2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 1496"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
-
C:\Windows\system32\find.exefind ":"3⤵PID:2700
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak3⤵
- Delays execution with timeout.exe
PID:2392
-
-
C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLogs\Update.exe"C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLogs\Update.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdater /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLogs\Update.exe /f4⤵
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdater /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLogs\Update.exe /f5⤵
- Adds Run key to start application
- Modifies registry key
PID:2508
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2920 -s 17684⤵PID:2152
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
281B
MD56cbca52c75033b6c042c40775a54fb78
SHA1533b5ba5d62720efeb8f5fca6550d132426601d7
SHA2561dc4cd20cd7f23a64f592ae50fb81afacab25148ef252809ba5d814171c6c759
SHA5124f8289d3985f31f6663b754346a3936a3322ad201c0b04a6491851a632ea668022d3d319c40de2fdf6da12575e4039e3835f9952e9ad08d0c4ea8c024e178296
-
Filesize
5.6MB
MD5612173309c257f2385cdc05c2f8f4ecc
SHA1e27c24d9a54df063a2cc22e687c9e5f08e0181cb
SHA256c9a0aea64ee81d3914980c968f2da7e45b17d008e81576b25fbc3c8415d1d899
SHA51279dad7c537b6573da25627c9379a562db337040c1f845e7cdb5cebe27c232f27476e2ab356353c571b617723aac61c869ebc1758615b32cad87fbfac1deb9d8b
-
Filesize
1.7MB
MD565ccd6ecb99899083d43f7c24eb8f869
SHA127037a9470cc5ed177c0b6688495f3a51996a023
SHA256aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4
SHA512533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d