Overview
overview
10Static
static
3183c36ee3a...0f.exe
windows7-x64
10183c36ee3a...0f.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3Set.exe
windows7-x64
9Set.exe
windows10-2004-x64
9Setup.exe
windows7-x64
10Setup.exe
windows10-2004-x64
10enigma_ide64.dll
windows7-x64
1enigma_ide64.dll
windows10-2004-x64
1Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2024 18:56
Static task
static1
Behavioral task
behavioral1
Sample
183c36ee3ad752f285926be4964605bc382369baea99bb528a14f34f24fd1a0f.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
183c36ee3ad752f285926be4964605bc382369baea99bb528a14f34f24fd1a0f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Set.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
Set.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Setup.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
Setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
enigma_ide64.dll
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
enigma_ide64.dll
Resource
win10v2004-20241007-en
General
-
Target
Setup.exe
-
Size
2.2MB
-
MD5
f15df54a6784030231c5ac44bd99c487
-
SHA1
ab3e392fc7ac8503ac6013fbe1981f21274ce0c4
-
SHA256
0eb59683e2dfd231d3a0a4bdf17d9a2c6871e29f99dcef2bef80dcd3006edd86
-
SHA512
1be6149eb8a0c9a94ae1d92a97256b388f982a9c1021d3c3ec049b6354a5d3c253af2dbb9517ef3c9f1b9600ed18a2f59a6d6b3ab5a94b110dd7d719d48c4321
-
SSDEEP
49152:wCHFzR0SjCrsYebwHAwKQOCG/nWCGTl7CcL9xjYNaSgu+GtnX:JFzRK4Y/HAwKQ51FZ7HLfjJSgu+GtnX
Malware Config
Extracted
cryptbot
bbu01.pro
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Setup.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Setup.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation Setup.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine Setup.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 11 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 456 Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Setup.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2364 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 456 Setup.exe 456 Setup.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 456 Setup.exe 456 Setup.exe 456 Setup.exe 456 Setup.exe 456 Setup.exe 456 Setup.exe 456 Setup.exe 456 Setup.exe 456 Setup.exe 456 Setup.exe 456 Setup.exe 456 Setup.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 456 wrote to memory of 3396 456 Setup.exe 108 PID 456 wrote to memory of 3396 456 Setup.exe 108 PID 456 wrote to memory of 3396 456 Setup.exe 108 PID 3396 wrote to memory of 2364 3396 cmd.exe 110 PID 3396 wrote to memory of 2364 3396 cmd.exe 110 PID 3396 wrote to memory of 2364 3396 cmd.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\ProgramData\FGgbiX1u & timeout 2 & del /f /q "C:\Users\Admin\AppData\Local\Temp\Setup.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Windows\SysWOW64\timeout.exetimeout 23⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2364
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148B
MD5c672c5ffd1a94b729484cc279d2a8a93
SHA13e3ce8ad41d3ffe36d461a21ded8fead5d11e88b
SHA256087e2c68049f6d81393d62c9fbca232111ec9e0411f5cc9ab1e718475581eaea
SHA512969821c1ea8ae7b400e0e603326a3eb76ad22c21572a12b34e50f97f174f53456e937872c1a5980f7401d702c56c00ec0c5fa4d9cdc38b7d2c6200037f12aae3
-
Filesize
8KB
MD5b26278b595c1368030c534214728a200
SHA1e1e7f38f617cbcbcc9ed2701fedb38d395a20f92
SHA25607b95ac6c7f6389599846ccb0d2e6b0b534ca81db194a15cf8c7d3fc6bdd2801
SHA512dde69445b46441dc874a8da581803d6ec18b20955d32c4354dd19d03d9c168dfdb22ab4c73a31051621bd4c43bf171c8f85210ee3b287e8f4c342e7d2b8281ad
-
Filesize
51KB
MD570880c7cae9c1ea2dbaa878414d533ea
SHA1dbcbbf892975c43cc257c03993438d2bc84679b1
SHA256ffe883fd0f629541aa8c7e9a2be3febbdcd342163926fbf15892beead9bb3159
SHA512f3b0692cbd758658938bbfe1c6b657724279a50a616ebf68c57a1c529ff7308ecee2d46dd2f93c8b94046195b6ce251d17c0a6b0841dae67b545c2dc0d824106
-
Filesize
47KB
MD517ae638891f200d274afc6eafa42cdcc
SHA17353d7b35db7b1e46ac0974aa47573aa6b61036e
SHA2564801e233d6f44f8dc0552b02de93f04ae68965d56f78a105a5243928ea97e302
SHA51264469efb54e9f0f93b6b9e1b21107acec746dacd527bb7ca3a61345cd720055825491418bc47e4bb1670005aa9d355f1c66f09dfadbb87ff587d8269efe21f80
-
Filesize
96KB
MD540f3eb83cc9d4cdb0ad82bd5ff2fb824
SHA1d6582ba879235049134fa9a351ca8f0f785d8835
SHA256cdd772b00ae53d4050150552b67028b7344bb1d345bceb495151cc969c27a0a0
SHA512cdd4dbf0b1ba73464cd7c5008dc05458862e5f608e336b53638a14965becd4781cdea595fd6bd18d0bf402dccffd719da292a6ce67d359527b4691dc6d6d4cc2