Overview
overview
10Static
static
5078db59624...6d.exe
windows7-x64
10078db59624...6d.exe
windows10-2004-x64
1007f59c1814...17.exe
windows7-x64
1007f59c1814...17.exe
windows10-2004-x64
10083d3eee79...8c.exe
windows7-x64
10083d3eee79...8c.exe
windows10-2004-x64
1008b9d4c939...ff.exe
windows7-x64
1008b9d4c939...ff.exe
windows10-2004-x64
1008c1757fc2...f6.exe
windows7-x64
1008c1757fc2...f6.exe
windows10-2004-x64
100d08ee2ca8...dd.exe
windows7-x64
100d08ee2ca8...dd.exe
windows10-2004-x64
100d1c17f831...d0.exe
windows7-x64
100d1c17f831...d0.exe
windows10-2004-x64
101017f357d8...c6.exe
windows7-x64
101017f357d8...c6.exe
windows10-2004-x64
10152de8e813...2e.exe
windows7-x64
10152de8e813...2e.exe
windows10-2004-x64
1018a7c9bb15...1a.exe
windows7-x64
1018a7c9bb15...1a.exe
windows10-2004-x64
101c429652e6...c5.exe
windows7-x64
101c429652e6...c5.exe
windows10-2004-x64
101fe8e976dc...0b.exe
windows7-x64
71fe8e976dc...0b.exe
windows10-2004-x64
7231f15571a...d3.exe
windows7-x64
10231f15571a...d3.exe
windows10-2004-x64
10253a433e14...6a.exe
windows7-x64
10253a433e14...6a.exe
windows10-2004-x64
1026ccb116f4...8f.exe
windows7-x64
1026ccb116f4...8f.exe
windows10-2004-x64
102936e6b87d...99.exe
windows7-x64
102936e6b87d...99.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 06:43
Behavioral task
behavioral1
Sample
078db59624b35fe4dd0fe0420bd99bd349aa053ef07c982fdc6a58effd96c76d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
078db59624b35fe4dd0fe0420bd99bd349aa053ef07c982fdc6a58effd96c76d.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
07f59c1814f6b5d712b6bd55b180bd9d69890eb337b44977749a59bf39958b17.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
07f59c1814f6b5d712b6bd55b180bd9d69890eb337b44977749a59bf39958b17.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
083d3eee7980bb0b8f28a0452ed2af47610e747db2823a0ad6eb7dbfad7ef98c.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
083d3eee7980bb0b8f28a0452ed2af47610e747db2823a0ad6eb7dbfad7ef98c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
08b9d4c93970927de49d4c012b62cf663a181a83afc9f6be03eac0afe0e736ff.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
08b9d4c93970927de49d4c012b62cf663a181a83afc9f6be03eac0afe0e736ff.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
08c1757fc2332f7d219bf2c7bff648ed78f51106e262e6e6f3ade6b0e847dff6.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
08c1757fc2332f7d219bf2c7bff648ed78f51106e262e6e6f3ade6b0e847dff6.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
0d08ee2ca8d53593d1394983068966c0f0f978afa9942e5df703f61a0579a9dd.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
0d08ee2ca8d53593d1394983068966c0f0f978afa9942e5df703f61a0579a9dd.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
0d1c17f83137538366a2ca9f2948458b00943a4b5033f5d0b9f25f85af36edd0.exe
Resource
win7-20241023-en
Behavioral task
behavioral14
Sample
0d1c17f83137538366a2ca9f2948458b00943a4b5033f5d0b9f25f85af36edd0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
1017f357d88223cb18ec43554b65f2ec3f2d67851c7723f3a21bf67d7f02f1c6.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
1017f357d88223cb18ec43554b65f2ec3f2d67851c7723f3a21bf67d7f02f1c6.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
152de8e813722eadbc25a08e1871382a887505388e03991595572bb632974e2e.exe
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
152de8e813722eadbc25a08e1871382a887505388e03991595572bb632974e2e.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
18a7c9bb155a24636fb7679c2c33562f66a85fa29949493d4a2dc31b0443321a.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
18a7c9bb155a24636fb7679c2c33562f66a85fa29949493d4a2dc31b0443321a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
1c429652e66bc481a2ce0309e4389cbcf93c1bd9727760d70418b9071a6818c5.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
1c429652e66bc481a2ce0309e4389cbcf93c1bd9727760d70418b9071a6818c5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
1fe8e976dc31ecc74c27018b3a7550e3c16c39b05f17237a39f59a1cf262330b.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
1fe8e976dc31ecc74c27018b3a7550e3c16c39b05f17237a39f59a1cf262330b.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
231f15571a7f90c6c74f0f6eb57a813a54fa927b5c13610e5d6ff680023852d3.exe
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
231f15571a7f90c6c74f0f6eb57a813a54fa927b5c13610e5d6ff680023852d3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
253a433e14fd88a5d504c492279fc0a4f192023768409738a11c17790499d66a.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
253a433e14fd88a5d504c492279fc0a4f192023768409738a11c17790499d66a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
26ccb116f44f24784c0c2e9e2f4f796b239ce96c34246b50194342c76fa3198f.exe
Resource
win7-20241023-en
Behavioral task
behavioral30
Sample
26ccb116f44f24784c0c2e9e2f4f796b239ce96c34246b50194342c76fa3198f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
2936e6b87d417380f2f28b8274f791a526d2dc7b2d9c014b80e8c88ab9ad2099.exe
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
2936e6b87d417380f2f28b8274f791a526d2dc7b2d9c014b80e8c88ab9ad2099.exe
Resource
win10v2004-20241007-en
General
-
Target
152de8e813722eadbc25a08e1871382a887505388e03991595572bb632974e2e.exe
-
Size
561KB
-
MD5
5e9712e43f7474e4b605e4aead37bde8
-
SHA1
fd091b56d35d223029680c2d05b229be395d4875
-
SHA256
152de8e813722eadbc25a08e1871382a887505388e03991595572bb632974e2e
-
SHA512
be4f79c70ad4eec73bac4e113d633d5f4b03162e22d73202a7f128fe282d5f6cdee8b919a6582bd64f249fdf5140e085e20df5da03bf6154e8b36ee4876b15db
-
SSDEEP
12288:MxjItJ8d0hh5bNU6IcBas4u50S3p8k3S/eIi:OjIAdC5BIdsp3p8k3S/
Malware Config
Extracted
cryptbot
basessri42.top
-
payload_url
http://dfgggloadq13.top/download.php?file=lv.exe
Signatures
-
CryptBot payload 5 IoCs
resource yara_rule behavioral18/memory/2904-2-0x00000000050A0000-0x0000000005140000-memory.dmp family_cryptbot behavioral18/memory/2904-3-0x0000000000400000-0x00000000004A3000-memory.dmp family_cryptbot behavioral18/memory/2904-4-0x0000000000400000-0x0000000004DD7000-memory.dmp family_cryptbot behavioral18/memory/2904-218-0x0000000000400000-0x0000000004DD7000-memory.dmp family_cryptbot behavioral18/memory/2904-221-0x0000000000400000-0x00000000004A3000-memory.dmp family_cryptbot -
Cryptbot family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
resource yara_rule behavioral18/memory/2904-1-0x0000000000400000-0x0000000004DD7000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 152de8e813722eadbc25a08e1871382a887505388e03991595572bb632974e2e.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 152de8e813722eadbc25a08e1871382a887505388e03991595572bb632974e2e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 152de8e813722eadbc25a08e1871382a887505388e03991595572bb632974e2e.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2904 152de8e813722eadbc25a08e1871382a887505388e03991595572bb632974e2e.exe 2904 152de8e813722eadbc25a08e1871382a887505388e03991595572bb632974e2e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\152de8e813722eadbc25a08e1871382a887505388e03991595572bb632974e2e.exe"C:\Users\Admin\AppData\Local\Temp\152de8e813722eadbc25a08e1871382a887505388e03991595572bb632974e2e.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
PID:2904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54f34cd42994b5c03d5f7f5fa024cc9fb
SHA1ef482103e1b02784d0d55d8f8f957ded0617577c
SHA256fd6fb484aa07a17c64f2edf023d3256aaaa79051adb141f509188f492a14fa61
SHA51268055bf6c1b2689ada13297ae7dbf9beb5cb41e357b0d50563d7e3750bb1bedbf5fb344d3ab2e06f2ff727050cadba24aa4b5b549f4c5c41ce4dc9754a68b24f
-
Filesize
4KB
MD5b144cc96952701c0dddfdd49dde7fbfc
SHA1183002c04e262e0386550420952d0191ac47d51a
SHA25603b58903a31f9781d2b10a7df019af3d099078df20e1ad6dbb610d8bfbbcaee4
SHA5123d1fc5188bffd5116e9ddff2902a451b49d8a8ed211c03d32a5d3161f931e0b4a26bcf0f9072d772769e750fae1479976e003e49f86ecf6459962503503a1a30
-
Filesize
47KB
MD52da7eae9db1b714813c23bafdfa8ebc2
SHA1ad43e12a09359193120d52b4c4baf981265c431c
SHA256fbbbdc8603f484f4c2dea195c961c3e41ef1da404201c56251d540010999c760
SHA512ce93e1bc00cd9c0e6392ce90cb7b50f66dd84a593f70fe37758b672fda56648a132ede3befe5867a71afbae96e518fec129c10fca54003c33841fa9ac4a5e349
-
Filesize
42KB
MD5dcf742f59f682b0a887d35c096b0dda8
SHA123e414f9a246d0753d19a76bb6a70a20b89155f0
SHA256fdb53e98c405c6ba32105fe63b3b03e2991a4d85bb344a55876af105306c1c3f
SHA5126f02bae33b61d15f4241e7162ab7bf4a64710657d3d62c603e286aa6468884faf7e13ec6c813021ba18a9ba05dea602b1f2b3a7c587722ee118cb29c7b7b8620
-
Filesize
1KB
MD50b7047eae4da8d0e423f359d4dab4d1d
SHA127d5feeb1fe3418046a3ad85b0b03fcaa24b9043
SHA256553a539fbac287e44cc689f05b38101384ffaf260bd8f431782bcec1f4a46fa9
SHA51216f2e7921b9cd7880546832118219e9e3d2de8ea5c44d8b750e8c4184a754355407206f47d80f3464ba0ca9753bd9c1fbd460828c13ae8cc29aa6773b3618993
-
Filesize
5KB
MD5200ce97704f46bb88798b680df10a826
SHA175276cc13ffed8d1e99fa4a094773234f886b84d
SHA256d56b9aab4961a26ec243e0d0409f00b7f1606896c39e14bea3da55619b7a9417
SHA512b34a0ffc2cbe152526560d3d53a84d71fbce6eaa7dfd041b7d3021670213c99196ea1463813cec14d327d2bf16cc2978fe6d0e180c7ad21f60afbc4c09410f8f
-
Filesize
42KB
MD5dbd391e36a6c60c1d1359bdb56bbb327
SHA10faef71e451f94d61fff0d6952a96606b3f4ec75
SHA256a3187ca57bb20442691aef856c86c1c9a70e6ff3e20970f0a751ef4aaa5caeb4
SHA5120cad32ac080ba6655beca58371658addb22520035d87f521c9b6186ac7a4fa0cf957bd5d3a1820ebd307a1523bdc38a7220035ab80aede090c50673381813431