Analysis

  • max time kernel
    248s
  • max time network
    216s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    23-09-2024 08:11

General

  • Target

    _△_LaTe$T░SeTuP░PA$S↳oPeN↳9192_△_.zip

  • Size

    11.4MB

  • MD5

    e1dcd0e648e6b9a41c93832a3939f0c7

  • SHA1

    b6117d817c6114b4d6143bed2521f852b140f6d4

  • SHA256

    f11ed152198063b52e70784377b79758d3786efdb5a92fa4c248d9d6920105da

  • SHA512

    84f67467ff5a511f832d5e8263b500895dcdedcdc886fb4f674041768dd03caadb844d89b903f344dc8eb481d0f97bc6c34f54a0b45060a7e40844c5e09a7927

  • SSDEEP

    196608:1l66/QNc4TuXO84APfLmKvKL4nB+qEbqY2+xkHuKUYIek81EfttWetB8:T66/9MuB4APTNc8UqgqexkOKUYZH1Efo

Malware Config

Extracted

Family

cryptbot

C2

forvf14vs.top

analforeverlovyu.top

Attributes
  • url_path

    /v1/upload.php

Signatures

  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 61 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 11 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\_△_LaTe$T░SeTuP░PA$S↳oPeN↳9192_△_.zip
    1⤵
      PID:864
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:1660
      • C:\Windows\system32\OpenWith.exe
        C:\Windows\system32\OpenWith.exe -Embedding
        1⤵
        • Modifies registry class
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:32
        • C:\Program Files\7-Zip\7zFM.exe
          "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Documents\_△_LaTe$T░SeTuP░PA$S↳oPeN↳9192_△_\~△~LaTe$T░SeTuP░PA$S↳oPeN↳9192~△~.rar"
          2⤵
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          PID:4388
      • C:\Users\Admin\Documents\_△_LaTe$T░SeTuP░PA$S↳oPeN↳9192_△_\Set-up.exe
        "C:\Users\Admin\Documents\_△_LaTe$T░SeTuP░PA$S↳oPeN↳9192_△_\Set-up.exe"
        1⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Suspicious use of WriteProcessMemory
        PID:4668
        • C:\Users\Admin\AppData\Local\Temp\service123.exe
          "C:\Users\Admin\AppData\Local\Temp\service123.exe"
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          PID:4536
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f
          2⤵
          • System Location Discovery: System Language Discovery
          • Scheduled Task/Job: Scheduled Task
          PID:240
      • C:\Users\Admin\Documents\_△_LaTe$T░SeTuP░PA$S↳oPeN↳9192_△_\Set-up.exe
        "C:\Users\Admin\Documents\_△_LaTe$T░SeTuP░PA$S↳oPeN↳9192_△_\Set-up.exe"
        1⤵
        • Executes dropped EXE
        PID:4504
      • C:\Users\Admin\Documents\_△_LaTe$T░SeTuP░PA$S↳oPeN↳9192_△_\Set-up.exe
        "C:\Users\Admin\Documents\_△_LaTe$T░SeTuP░PA$S↳oPeN↳9192_△_\Set-up.exe"
        1⤵
        • Executes dropped EXE
        PID:1232
      • C:\Users\Admin\Documents\_△_LaTe$T░SeTuP░PA$S↳oPeN↳9192_△_\Set-up.exe
        "C:\Users\Admin\Documents\_△_LaTe$T░SeTuP░PA$S↳oPeN↳9192_△_\Set-up.exe"
        1⤵
        • Executes dropped EXE
        PID:3388
      • C:\Program Files\VideoLAN\VLC\vlc.exe
        "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Documents\_△_LaTe$T░SeTuP░PA$S↳oPeN↳9192_△_\carferry.flv"
        1⤵
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        PID:3364
      • C:\Program Files\7-Zip\7zFM.exe
        "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Documents\_△_LaTe$T░SeTuP░PA$S↳oPeN↳9192_△_\~△~LaTe$T░SeTuP░PA$S↳oPeN↳9192~△~.rar"
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:4832

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db

        Filesize

        28KB

        MD5

        12a1746600b124e34c681ab785c8df3b

        SHA1

        1da5f13baf3072030c742fe272ec7831ec153b2e

        SHA256

        f9a0679d519e9c9be2338ce731da18f9bbc8d052aa1db6541a7010b386a66289

        SHA512

        3aca3dec4af8ee8502a92863c74141dadbf75fbdfa415932f8398ab6fdd4f027cc4bc5ea88ec2268d1555a1819c0f75bfe400a84c8d1c07457e43cc81dbb000b

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Explorer\iconcache_idx.db

        Filesize

        28KB

        MD5

        7b4573c699adca48b24f56d1a87e2bd6

        SHA1

        1c38b22075b4d1ee7aadcb64707682ead1f96de7

        SHA256

        6c169f8ac6e828cf567a651b2272af9ad47a1248009faf6ab22ed16d4c0c6b33

        SHA512

        28de00d011a83d55931f8ab6120cc599ae2cefe32f86def3b92e921c8069d76efa4dc9ce65cf73855100520064f1a6aac4f948c85f9288ecd795a4d614049fc6

      • C:\Users\Admin\Documents\_△_LaTe$T░SeTuP░PA$S↳oPeN↳9192_△_\Set-up.exe

        Filesize

        6.4MB

        MD5

        c275190b7a27146fcd3c22bd854b5c6f

        SHA1

        61647ef2da589ce9592d6e14b4f84ae9948616b5

        SHA256

        48cf8e1f546c7e4e68251a1be5173dc6b8554df7d8708423e0a0e6bd2442919a

        SHA512

        6f035fda134bf089cf6a7707b714ca1c1245c62c313eef34bacc0944e55459109b9db42f6036e05b18b0798f097e1c561edd5e1b55a8915f65d7857662a8a35c

      • C:\Users\Admin\Documents\_△_LaTe$T░SeTuP░PA$S↳oPeN↳9192_△_\carferry.flv

        Filesize

        11KB

        MD5

        16a30926e4ebc495d3659854c3731f63

        SHA1

        2b46d1ee4f0b9c6b184aad6d9a246745b3b4163c

        SHA256

        dc260b93c358e10fc6f74c0b9f487dd0c2fd58e791ec5b0925b0546258923b36

        SHA512

        04a4893e068a6bcbec340398868b37adcf8d41580b2e6eb7a5cd30396a14acd401e67cfbb0e3ed05fa31601cb0261b82df2a4d9a3713db7e39c61c7fb64ea71f

      • memory/1232-222-0x0000000000400000-0x000000000106E000-memory.dmp

        Filesize

        12.4MB

      • memory/3364-250-0x00007FFD5B760000-0x00007FFD5B7A1000-memory.dmp

        Filesize

        260KB

      • memory/3364-254-0x00007FFD5B4D0000-0x00007FFD5B4E1000-memory.dmp

        Filesize

        68KB

      • memory/3364-265-0x00000211296A0000-0x000002112AF0F000-memory.dmp

        Filesize

        24.4MB

      • memory/3364-260-0x00007FFD49690000-0x00007FFD4A740000-memory.dmp

        Filesize

        16.7MB

      • memory/3364-245-0x00007FFD5CA30000-0x00007FFD5CA47000-memory.dmp

        Filesize

        92KB

      • memory/3364-242-0x00007FFD61B00000-0x00007FFD61B18000-memory.dmp

        Filesize

        96KB

      • memory/3364-243-0x00007FFD60800000-0x00007FFD60817000-memory.dmp

        Filesize

        92KB

      • memory/3364-240-0x00007FFD64E70000-0x00007FFD64EA4000-memory.dmp

        Filesize

        208KB

      • memory/3364-239-0x00007FF772CD0000-0x00007FF772DC8000-memory.dmp

        Filesize

        992KB

      • memory/3364-246-0x00007FFD5C660000-0x00007FFD5C671000-memory.dmp

        Filesize

        68KB

      • memory/3364-241-0x00007FFD57D00000-0x00007FFD57FB6000-memory.dmp

        Filesize

        2.7MB

      • memory/3364-249-0x00007FFD4A740000-0x00007FFD4A94B000-memory.dmp

        Filesize

        2.0MB

      • memory/3364-259-0x00007FFD57A40000-0x00007FFD57A70000-memory.dmp

        Filesize

        192KB

      • memory/3364-258-0x00007FFD57A70000-0x00007FFD57A88000-memory.dmp

        Filesize

        96KB

      • memory/3364-257-0x00007FFD57A90000-0x00007FFD57AA1000-memory.dmp

        Filesize

        68KB

      • memory/3364-256-0x00007FFD57AB0000-0x00007FFD57ACB000-memory.dmp

        Filesize

        108KB

      • memory/3364-255-0x00007FFD5B100000-0x00007FFD5B111000-memory.dmp

        Filesize

        68KB

      • memory/3364-244-0x00007FFD5F330000-0x00007FFD5F341000-memory.dmp

        Filesize

        68KB

      • memory/3364-253-0x00007FFD5B590000-0x00007FFD5B5A1000-memory.dmp

        Filesize

        68KB

      • memory/3364-261-0x00007FFD579D0000-0x00007FFD57A37000-memory.dmp

        Filesize

        412KB

      • memory/3364-264-0x00007FFD51FB0000-0x00007FFD52007000-memory.dmp

        Filesize

        348KB

      • memory/3364-263-0x00007FFD64490000-0x00007FFD644A1000-memory.dmp

        Filesize

        68KB

      • memory/3364-262-0x00007FFD5B8C0000-0x00007FFD5B93C000-memory.dmp

        Filesize

        496KB

      • memory/3364-252-0x00007FFD5B5B0000-0x00007FFD5B5C8000-memory.dmp

        Filesize

        96KB

      • memory/3364-251-0x00007FFD5B840000-0x00007FFD5B861000-memory.dmp

        Filesize

        132KB

      • memory/3364-247-0x00007FFD5C490000-0x00007FFD5C4AD000-memory.dmp

        Filesize

        116KB

      • memory/3364-248-0x00007FFD5B870000-0x00007FFD5B881000-memory.dmp

        Filesize

        68KB

      • memory/3388-226-0x0000000000400000-0x000000000106E000-memory.dmp

        Filesize

        12.4MB

      • memory/4504-205-0x0000000000400000-0x000000000106E000-memory.dmp

        Filesize

        12.4MB

      • memory/4504-220-0x0000000000400000-0x000000000106E000-memory.dmp

        Filesize

        12.4MB

      • memory/4536-218-0x0000000000D50000-0x0000000000D61000-memory.dmp

        Filesize

        68KB

      • memory/4536-219-0x0000000075550000-0x000000007568C000-memory.dmp

        Filesize

        1.2MB

      • memory/4668-201-0x0000000000400000-0x000000000106E000-memory.dmp

        Filesize

        12.4MB

      • memory/4668-215-0x0000000000400000-0x000000000106E000-memory.dmp

        Filesize

        12.4MB

      • memory/4668-200-0x0000000000400000-0x000000000106E000-memory.dmp

        Filesize

        12.4MB