Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 17:57
Static task
static1
Behavioral task
behavioral1
Sample
2529fedf71b1b54b4084a59546956dad83c173fe02e02700cc04b78594cf0727.exe
Resource
win7-20240903-en
General
-
Target
2529fedf71b1b54b4084a59546956dad83c173fe02e02700cc04b78594cf0727.exe
-
Size
6.4MB
-
MD5
b50c1e840e9452d6898eba3458982e88
-
SHA1
b0144d10b4da7a3074aec23d570677f11a3201de
-
SHA256
2529fedf71b1b54b4084a59546956dad83c173fe02e02700cc04b78594cf0727
-
SHA512
dde0ad5cd22c0eea8faebf16bf28dcb07e3a51e46a1573ea857c7a79a832f70f750e670b1e66577c867402714b22e074de0216db9359c299615b5d73122fa0e8
-
SSDEEP
196608:fgZ1CgmuCZ92WTs6YoQB3NhPn9PKcWkFV:fWV9CZ9n54hf9DlV
Malware Config
Extracted
cryptbot
eihtvf18vt.top
analforeverlovyu.top
-
url_path
/v1/upload.php
Extracted
lumma
https://coinnyfrownwejr.shop/api
https://racedsuitreow.shop/api
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation 2529fedf71b1b54b4084a59546956dad83c173fe02e02700cc04b78594cf0727.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation VC_redist.x86.exe -
Executes dropped EXE 4 IoCs
pid Process 5076 VC_redist.x64.exe 1828 VC_redist.x86.exe 4452 service123.exe 4232 service123.exe -
Loads dropped DLL 2 IoCs
pid Process 4452 service123.exe 4232 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5076 set thread context of 3628 5076 VC_redist.x64.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2529fedf71b1b54b4084a59546956dad83c173fe02e02700cc04b78594cf0727.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VC_redist.x86.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 VC_redist.x86.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString VC_redist.x86.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1580 schtasks.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2780 wrote to memory of 5076 2780 2529fedf71b1b54b4084a59546956dad83c173fe02e02700cc04b78594cf0727.exe 82 PID 2780 wrote to memory of 5076 2780 2529fedf71b1b54b4084a59546956dad83c173fe02e02700cc04b78594cf0727.exe 82 PID 5076 wrote to memory of 3628 5076 VC_redist.x64.exe 92 PID 5076 wrote to memory of 3628 5076 VC_redist.x64.exe 92 PID 5076 wrote to memory of 3628 5076 VC_redist.x64.exe 92 PID 5076 wrote to memory of 3628 5076 VC_redist.x64.exe 92 PID 5076 wrote to memory of 3628 5076 VC_redist.x64.exe 92 PID 2780 wrote to memory of 1828 2780 2529fedf71b1b54b4084a59546956dad83c173fe02e02700cc04b78594cf0727.exe 93 PID 2780 wrote to memory of 1828 2780 2529fedf71b1b54b4084a59546956dad83c173fe02e02700cc04b78594cf0727.exe 93 PID 2780 wrote to memory of 1828 2780 2529fedf71b1b54b4084a59546956dad83c173fe02e02700cc04b78594cf0727.exe 93 PID 1828 wrote to memory of 4452 1828 VC_redist.x86.exe 96 PID 1828 wrote to memory of 4452 1828 VC_redist.x86.exe 96 PID 1828 wrote to memory of 4452 1828 VC_redist.x86.exe 96 PID 1828 wrote to memory of 1580 1828 VC_redist.x86.exe 97 PID 1828 wrote to memory of 1580 1828 VC_redist.x86.exe 97 PID 1828 wrote to memory of 1580 1828 VC_redist.x86.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\2529fedf71b1b54b4084a59546956dad83c173fe02e02700cc04b78594cf0727.exe"C:\Users\Admin\AppData\Local\Temp\2529fedf71b1b54b4084a59546956dad83c173fe02e02700cc04b78594cf0727.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x64.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x64.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe3⤵
- System Location Discovery: System Language Discovery
PID:3628
-
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x86.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x86.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4452
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1580
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16.4MB
MD59a8fcf471ff5cd4b51cc4ce397b85482
SHA125b2d0fd6b1b0c8bbbfcbd46f608842cfdb59138
SHA25601f29c10eddb472f8c172845d03818c780f833ce9cd8f46e1b48d046060cf98b
SHA51251f5828c98ddb5bca20e3bc1b224ab8fd7d1c1cb3398d2d656d21a70d00c53df7040feda95f73ec382c4d8566f896a378e555c546846d29495524e2474b8c94f
-
Filesize
6.4MB
MD5e0f961a0645e07efae6aa9d7835d70be
SHA13e4e5c3e9770f1bf3cf2a49695d4e707e43a0336
SHA256f601b36824f7e81556cd468366914c010c2ab70fc038ab9a6790d4ba94dd22d3
SHA512652f1c4081c6172dd653286e71fcc153df7b796e4a0beb56df1cb791ff9e65f37cdd15891e85ca0f9799ef76cb4a33764478d7b8a8dfcf7df4bbe321cfaa37ef