Overview
overview
10Static
static
3183c36ee3a...0f.exe
windows7-x64
10183c36ee3a...0f.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3Set.exe
windows7-x64
9Set.exe
windows10-2004-x64
9Setup.exe
windows7-x64
10Setup.exe
windows10-2004-x64
10enigma_ide64.dll
windows7-x64
1enigma_ide64.dll
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-10-2024 18:56
Static task
static1
Behavioral task
behavioral1
Sample
183c36ee3ad752f285926be4964605bc382369baea99bb528a14f34f24fd1a0f.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
183c36ee3ad752f285926be4964605bc382369baea99bb528a14f34f24fd1a0f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Set.exe
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
Set.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Setup.exe
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
Setup.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
enigma_ide64.dll
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
enigma_ide64.dll
Resource
win10v2004-20241007-en
General
-
Target
183c36ee3ad752f285926be4964605bc382369baea99bb528a14f34f24fd1a0f.exe
-
Size
4.2MB
-
MD5
ea139ce157017edaa2f1e02a542511f1
-
SHA1
232813abc1d12b97993d003856576888aa726fbd
-
SHA256
183c36ee3ad752f285926be4964605bc382369baea99bb528a14f34f24fd1a0f
-
SHA512
6dbd95b8408ba2bb6912c4317b9604ccb887891ba14506588df7756a6b1ca6337c22c3edbcadaec0b4fdc50e5c55c682d6f6182535082e8cc608899602bea8bf
-
SSDEEP
98304:EK7gDjHWlGX0IteolSDXduV/CybcRj80N/sXDx30D+1cNJt/b6Bl9k3:EK7gHlEAtl8Xchbc91m3W1/aLm
Malware Config
Extracted
cryptbot
bbu01.pro
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Set.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Setup.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Set.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Set.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Setup.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation Set.exe -
Executes dropped EXE 2 IoCs
pid Process 952 Set.exe 3104 Setup.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine Set.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine Setup.exe -
Loads dropped DLL 1 IoCs
pid Process 1004 183c36ee3ad752f285926be4964605bc382369baea99bb528a14f34f24fd1a0f.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
flow ioc 20 iplogger.org 41 bitbucket.org 42 bitbucket.org 19 iplogger.org -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 51 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 952 Set.exe 3104 Setup.exe -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files (x86)\Hop\Software Update.xml 183c36ee3ad752f285926be4964605bc382369baea99bb528a14f34f24fd1a0f.exe File created C:\Program Files (x86)\Hop\Software News.xml 183c36ee3ad752f285926be4964605bc382369baea99bb528a14f34f24fd1a0f.exe File created C:\Program Files (x86)\Hop\enigma_ide64.dll 183c36ee3ad752f285926be4964605bc382369baea99bb528a14f34f24fd1a0f.exe File created C:\Program Files (x86)\Hop\Set.exe 183c36ee3ad752f285926be4964605bc382369baea99bb528a14f34f24fd1a0f.exe File created C:\Program Files (x86)\Hop\Setup.exe 183c36ee3ad752f285926be4964605bc382369baea99bb528a14f34f24fd1a0f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 183c36ee3ad752f285926be4964605bc382369baea99bb528a14f34f24fd1a0f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Set.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Setup.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Setup.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 952 Set.exe 952 Set.exe 3104 Setup.exe 3104 Setup.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 3104 Setup.exe 3104 Setup.exe 3104 Setup.exe 3104 Setup.exe 3104 Setup.exe 3104 Setup.exe 3104 Setup.exe 3104 Setup.exe 3104 Setup.exe 3104 Setup.exe 3104 Setup.exe 3104 Setup.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1004 wrote to memory of 952 1004 183c36ee3ad752f285926be4964605bc382369baea99bb528a14f34f24fd1a0f.exe 86 PID 1004 wrote to memory of 952 1004 183c36ee3ad752f285926be4964605bc382369baea99bb528a14f34f24fd1a0f.exe 86 PID 1004 wrote to memory of 952 1004 183c36ee3ad752f285926be4964605bc382369baea99bb528a14f34f24fd1a0f.exe 86 PID 1004 wrote to memory of 3104 1004 183c36ee3ad752f285926be4964605bc382369baea99bb528a14f34f24fd1a0f.exe 100 PID 1004 wrote to memory of 3104 1004 183c36ee3ad752f285926be4964605bc382369baea99bb528a14f34f24fd1a0f.exe 100 PID 1004 wrote to memory of 3104 1004 183c36ee3ad752f285926be4964605bc382369baea99bb528a14f34f24fd1a0f.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\183c36ee3ad752f285926be4964605bc382369baea99bb528a14f34f24fd1a0f.exe"C:\Users\Admin\AppData\Local\Temp\183c36ee3ad752f285926be4964605bc382369baea99bb528a14f34f24fd1a0f.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Program Files (x86)\Hop\Set.exe"C:\Program Files (x86)\Hop\Set.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:952
-
-
C:\Program Files (x86)\Hop\Setup.exe"C:\Program Files (x86)\Hop\Setup.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:3104
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD557a124f28215ba2dfbe7b8d264b0741b
SHA1285f1f0ede5561caba18c6d5f6b95efd7f652293
SHA256683f4c758e2b8cfc95d9df625c17ece1d9c3fe4ab4fb33e8924d0bc8618eb6b7
SHA5129f45535df4e00acb612f3d15be1d4082e1027d3cdb39a9547a2d8e8c86d2e8950a0285512eacbbd6ce73608ab3f28edbf0c90059a83497d3f392e457435a3557
-
Filesize
2.2MB
MD5f15df54a6784030231c5ac44bd99c487
SHA1ab3e392fc7ac8503ac6013fbe1981f21274ce0c4
SHA2560eb59683e2dfd231d3a0a4bdf17d9a2c6871e29f99dcef2bef80dcd3006edd86
SHA5121be6149eb8a0c9a94ae1d92a97256b388f982a9c1021d3c3ec049b6354a5d3c253af2dbb9517ef3c9f1b9600ed18a2f59a6d6b3ab5a94b110dd7d719d48c4321
-
Filesize
1KB
MD50e6b2966a02bc68b6e3f2b579e3c5af6
SHA168022d1ea14e0afd3eaabe07f7f9be640d97bd10
SHA256cb99e475de78bb4d53fa855e5047cb1860863d8c18cef83e85478cc0d3b762f5
SHA512a9bf443a5be7585d05b08e8e913ebe4d1b211eb189ce07811283133e03e70e2cd0799ed54ca44f1b919f0becae8882bbfc117702f96966dd0cb6686410c0211b
-
Filesize
4KB
MD5484b3c381756074fd7c9650ea39f67d6
SHA114a22fdf8f135c3a691b792616815c4af9cde881
SHA2564986eb6d105f8dd88876d9ad86772285a68e325e5aa8075f6324d6d2cf3738f0
SHA5129f25747772cd6e3c14beb95f77bbe75868e24aed6a91f03b50c36989f81e3960234f8e7ee863201e0ecc0f684a439600ce7bf6d5f2ab62f478997834fb523a77
-
Filesize
507KB
MD5be2b4d8018915b5f1a966a609b9c5c7c
SHA15df43b217d76d0117703437e5a7ff47999b4c5be
SHA2568941f0bc4c43e9fe881dd6229f6b525e93b80c77bf2a5488be25ee8486863e84
SHA512b13f9832cff7f9311d3684db66d457342e7e072c7388488cb939ea70e336f273c3a6fbb2f19adb2a3abafeef96a2c309d1d76e3b6676846a5d5965f16fbbb371
-
Filesize
148B
MD5c672c5ffd1a94b729484cc279d2a8a93
SHA13e3ce8ad41d3ffe36d461a21ded8fead5d11e88b
SHA256087e2c68049f6d81393d62c9fbca232111ec9e0411f5cc9ab1e718475581eaea
SHA512969821c1ea8ae7b400e0e603326a3eb76ad22c21572a12b34e50f97f174f53456e937872c1a5980f7401d702c56c00ec0c5fa4d9cdc38b7d2c6200037f12aae3
-
Filesize
14KB
MD5adb29e6b186daa765dc750128649b63d
SHA1160cbdc4cb0ac2c142d361df138c537aa7e708c9
SHA2562f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08
SHA512b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada
-
Filesize
15KB
MD5b1ad7eb365618775fb6b5b6674a47ed4
SHA10ccb020bc70c4b69029998596fd201869b7964df
SHA2562883989c626b906f8b20e2562e6c470ee852d589cb02d43474a3f0fbd33cd68c
SHA512a72f97add6cd8ee16c205a4d393c9de7b32cf012a9d5ddbc91a21867ad690151d290cfd682dd1dabc41e76544eb75ef8225bd8e2368c0a6911607d74ea1039a2