Analysis
-
max time kernel
144s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-09-2024 07:40
Static task
static1
Behavioral task
behavioral1
Sample
2c74960436b0ad3e564f0a0a3dc5fbc6dcfd167fa1409fbf5fe36a37af8027b3.exe
Resource
win7-20240903-en
General
-
Target
2c74960436b0ad3e564f0a0a3dc5fbc6dcfd167fa1409fbf5fe36a37af8027b3.exe
-
Size
7.2MB
-
MD5
a2b2178ff8d9e79623eb59ad897cb8ed
-
SHA1
6e3d9d4174b4c32aede0940669b858e95e8ef835
-
SHA256
2c74960436b0ad3e564f0a0a3dc5fbc6dcfd167fa1409fbf5fe36a37af8027b3
-
SHA512
080fbb3645967515186aeb3d20e714bc7bb12f4f9a408826a299d30f96d347eea0ae840bf30dd3dd51580a23e26802dab29782b76c88eb191052f80f8b4616c0
-
SSDEEP
98304:QsmhiMn1iZlNHePwSB2ptG4dOuHWw5QLXiQO3zneSJkvieklpIN47AtC486fa0FV:SNu7HePorG4775QLyDznrEzQ7l4nnV
Malware Config
Extracted
cryptbot
eihtvf18vs.top
analforeverlovyu.top
-
url_path
/v1/upload.php
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 2184 VC_redist.x64.exe 2352 VC_redist.x86.exe 2712 service123.exe 940 service123.exe 2144 service123.exe -
Loads dropped DLL 10 IoCs
pid Process 2116 2c74960436b0ad3e564f0a0a3dc5fbc6dcfd167fa1409fbf5fe36a37af8027b3.exe 2116 2c74960436b0ad3e564f0a0a3dc5fbc6dcfd167fa1409fbf5fe36a37af8027b3.exe 2116 2c74960436b0ad3e564f0a0a3dc5fbc6dcfd167fa1409fbf5fe36a37af8027b3.exe 2116 2c74960436b0ad3e564f0a0a3dc5fbc6dcfd167fa1409fbf5fe36a37af8027b3.exe 2116 2c74960436b0ad3e564f0a0a3dc5fbc6dcfd167fa1409fbf5fe36a37af8027b3.exe 2352 VC_redist.x86.exe 2352 VC_redist.x86.exe 2712 service123.exe 940 service123.exe 2144 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2c74960436b0ad3e564f0a0a3dc5fbc6dcfd167fa1409fbf5fe36a37af8027b3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VC_redist.x86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 VC_redist.x86.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString VC_redist.x86.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2624 schtasks.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2184 2116 2c74960436b0ad3e564f0a0a3dc5fbc6dcfd167fa1409fbf5fe36a37af8027b3.exe 30 PID 2116 wrote to memory of 2184 2116 2c74960436b0ad3e564f0a0a3dc5fbc6dcfd167fa1409fbf5fe36a37af8027b3.exe 30 PID 2116 wrote to memory of 2184 2116 2c74960436b0ad3e564f0a0a3dc5fbc6dcfd167fa1409fbf5fe36a37af8027b3.exe 30 PID 2116 wrote to memory of 2184 2116 2c74960436b0ad3e564f0a0a3dc5fbc6dcfd167fa1409fbf5fe36a37af8027b3.exe 30 PID 2116 wrote to memory of 2352 2116 2c74960436b0ad3e564f0a0a3dc5fbc6dcfd167fa1409fbf5fe36a37af8027b3.exe 31 PID 2116 wrote to memory of 2352 2116 2c74960436b0ad3e564f0a0a3dc5fbc6dcfd167fa1409fbf5fe36a37af8027b3.exe 31 PID 2116 wrote to memory of 2352 2116 2c74960436b0ad3e564f0a0a3dc5fbc6dcfd167fa1409fbf5fe36a37af8027b3.exe 31 PID 2116 wrote to memory of 2352 2116 2c74960436b0ad3e564f0a0a3dc5fbc6dcfd167fa1409fbf5fe36a37af8027b3.exe 31 PID 2352 wrote to memory of 2712 2352 VC_redist.x86.exe 33 PID 2352 wrote to memory of 2712 2352 VC_redist.x86.exe 33 PID 2352 wrote to memory of 2712 2352 VC_redist.x86.exe 33 PID 2352 wrote to memory of 2712 2352 VC_redist.x86.exe 33 PID 2352 wrote to memory of 2624 2352 VC_redist.x86.exe 34 PID 2352 wrote to memory of 2624 2352 VC_redist.x86.exe 34 PID 2352 wrote to memory of 2624 2352 VC_redist.x86.exe 34 PID 2352 wrote to memory of 2624 2352 VC_redist.x86.exe 34 PID 2716 wrote to memory of 940 2716 taskeng.exe 37 PID 2716 wrote to memory of 940 2716 taskeng.exe 37 PID 2716 wrote to memory of 940 2716 taskeng.exe 37 PID 2716 wrote to memory of 940 2716 taskeng.exe 37 PID 2716 wrote to memory of 2144 2716 taskeng.exe 38 PID 2716 wrote to memory of 2144 2716 taskeng.exe 38 PID 2716 wrote to memory of 2144 2716 taskeng.exe 38 PID 2716 wrote to memory of 2144 2716 taskeng.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c74960436b0ad3e564f0a0a3dc5fbc6dcfd167fa1409fbf5fe36a37af8027b3.exe"C:\Users\Admin\AppData\Local\Temp\2c74960436b0ad3e564f0a0a3dc5fbc6dcfd167fa1409fbf5fe36a37af8027b3.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x64.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x64.exe"2⤵
- Executes dropped EXE
PID:2184
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x86.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x86.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2712
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2624
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {981E9E6D-F59A-47E1-A491-C8B40E2FE2EF} S-1-5-21-4177215427-74451935-3209572229-1000:JSMURNPT\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:940
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17.6MB
MD549b80660895dcbb56e08d7d384ff61f4
SHA13ecf06f9eebe08bb1f515e8e7749ee3b66230626
SHA256f230810eb32e01c9625f5c719bda9b4eff9b7b5ff891483c3d0717e5663db11d
SHA5124608af7ce0f2d3ed295a43a74b2a4115209b95478e17e8c7395e3e6815cd233ca15d8032352524ac6742010b42499c1c07f3c03d554b4c2943325753602fd3de
-
Filesize
6.3MB
MD5609e9de6532f48d4f7f07682df6cde91
SHA17c9840717a3611f0694d4cc3df1df48195b1aafe
SHA256d0707c41dd76048750c09129c112771850dac65b78eff404457b5dd23bc9d92c
SHA512fbf734d7ef66548da1a9f35479d19c7b76896d2112cd9731391cd9daed52ee41d5769bef8c396511262cfb03015ebfbdeda1ea017d23ce44704d51bb104fa740