Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 01:30
Static task
static1
Behavioral task
behavioral1
Sample
4982cf1702801f6cedce0fabdf5d5e1cf94af778b768eddad5044f923180cb89.exe
Resource
win7-20240704-en
General
-
Target
4982cf1702801f6cedce0fabdf5d5e1cf94af778b768eddad5044f923180cb89.exe
-
Size
6.4MB
-
MD5
d5ef7a30cb9c06cafd2654a3c8018425
-
SHA1
b88c6e3e2abe0edd06e4565cd5b9f4f8e9a72a6c
-
SHA256
4982cf1702801f6cedce0fabdf5d5e1cf94af778b768eddad5044f923180cb89
-
SHA512
f409dd5c797f7117f93bd5a2ce67372b135a624bdbeaa6d457a8860e2d5460d13d01de1ffc27ea560da7f5f914204262ba1a4b77e8a26421eea5161d3d72bf0b
-
SSDEEP
98304:4bShAumVddxYQEyKENP1xKkGSlXCgGH1w64ObLyXO:4bShApjdmstxDC1H1LbmXO
Malware Config
Extracted
cryptbot
twelvevf12vt.top
-
url_path
/v1/upload.php
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2892 service123.exe 1088 service123.exe 2376 service123.exe -
Loads dropped DLL 5 IoCs
pid Process 1804 4982cf1702801f6cedce0fabdf5d5e1cf94af778b768eddad5044f923180cb89.exe 1804 4982cf1702801f6cedce0fabdf5d5e1cf94af778b768eddad5044f923180cb89.exe 2892 service123.exe 1088 service123.exe 2376 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4982cf1702801f6cedce0fabdf5d5e1cf94af778b768eddad5044f923180cb89.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 4982cf1702801f6cedce0fabdf5d5e1cf94af778b768eddad5044f923180cb89.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 4982cf1702801f6cedce0fabdf5d5e1cf94af778b768eddad5044f923180cb89.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3000 schtasks.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1804 wrote to memory of 2892 1804 4982cf1702801f6cedce0fabdf5d5e1cf94af778b768eddad5044f923180cb89.exe 31 PID 1804 wrote to memory of 2892 1804 4982cf1702801f6cedce0fabdf5d5e1cf94af778b768eddad5044f923180cb89.exe 31 PID 1804 wrote to memory of 2892 1804 4982cf1702801f6cedce0fabdf5d5e1cf94af778b768eddad5044f923180cb89.exe 31 PID 1804 wrote to memory of 2892 1804 4982cf1702801f6cedce0fabdf5d5e1cf94af778b768eddad5044f923180cb89.exe 31 PID 1804 wrote to memory of 3000 1804 4982cf1702801f6cedce0fabdf5d5e1cf94af778b768eddad5044f923180cb89.exe 32 PID 1804 wrote to memory of 3000 1804 4982cf1702801f6cedce0fabdf5d5e1cf94af778b768eddad5044f923180cb89.exe 32 PID 1804 wrote to memory of 3000 1804 4982cf1702801f6cedce0fabdf5d5e1cf94af778b768eddad5044f923180cb89.exe 32 PID 1804 wrote to memory of 3000 1804 4982cf1702801f6cedce0fabdf5d5e1cf94af778b768eddad5044f923180cb89.exe 32 PID 2096 wrote to memory of 1088 2096 taskeng.exe 35 PID 2096 wrote to memory of 1088 2096 taskeng.exe 35 PID 2096 wrote to memory of 1088 2096 taskeng.exe 35 PID 2096 wrote to memory of 1088 2096 taskeng.exe 35 PID 2096 wrote to memory of 2376 2096 taskeng.exe 36 PID 2096 wrote to memory of 2376 2096 taskeng.exe 36 PID 2096 wrote to memory of 2376 2096 taskeng.exe 36 PID 2096 wrote to memory of 2376 2096 taskeng.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\4982cf1702801f6cedce0fabdf5d5e1cf94af778b768eddad5044f923180cb89.exe"C:\Users\Admin\AppData\Local\Temp\4982cf1702801f6cedce0fabdf5d5e1cf94af778b768eddad5044f923180cb89.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2892
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3000
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {2AE7B70C-D59A-4EFD-A66A-A0B8BF99C2EF} S-1-5-21-3434294380-2554721341-1919518612-1000:ELZYPTFV\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1088
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2376
-