Overview
overview
10Static
static
5078db59624...6d.exe
windows7-x64
10078db59624...6d.exe
windows10-2004-x64
1007f59c1814...17.exe
windows7-x64
1007f59c1814...17.exe
windows10-2004-x64
10083d3eee79...8c.exe
windows7-x64
10083d3eee79...8c.exe
windows10-2004-x64
1008b9d4c939...ff.exe
windows7-x64
1008b9d4c939...ff.exe
windows10-2004-x64
1008c1757fc2...f6.exe
windows7-x64
1008c1757fc2...f6.exe
windows10-2004-x64
100d08ee2ca8...dd.exe
windows7-x64
100d08ee2ca8...dd.exe
windows10-2004-x64
100d1c17f831...d0.exe
windows7-x64
100d1c17f831...d0.exe
windows10-2004-x64
101017f357d8...c6.exe
windows7-x64
101017f357d8...c6.exe
windows10-2004-x64
10152de8e813...2e.exe
windows7-x64
10152de8e813...2e.exe
windows10-2004-x64
1018a7c9bb15...1a.exe
windows7-x64
1018a7c9bb15...1a.exe
windows10-2004-x64
101c429652e6...c5.exe
windows7-x64
101c429652e6...c5.exe
windows10-2004-x64
101fe8e976dc...0b.exe
windows7-x64
71fe8e976dc...0b.exe
windows10-2004-x64
7231f15571a...d3.exe
windows7-x64
10231f15571a...d3.exe
windows10-2004-x64
10253a433e14...6a.exe
windows7-x64
10253a433e14...6a.exe
windows10-2004-x64
1026ccb116f4...8f.exe
windows7-x64
1026ccb116f4...8f.exe
windows10-2004-x64
102936e6b87d...99.exe
windows7-x64
102936e6b87d...99.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
08-11-2024 06:43
Behavioral task
behavioral1
Sample
078db59624b35fe4dd0fe0420bd99bd349aa053ef07c982fdc6a58effd96c76d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
078db59624b35fe4dd0fe0420bd99bd349aa053ef07c982fdc6a58effd96c76d.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
07f59c1814f6b5d712b6bd55b180bd9d69890eb337b44977749a59bf39958b17.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
07f59c1814f6b5d712b6bd55b180bd9d69890eb337b44977749a59bf39958b17.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
083d3eee7980bb0b8f28a0452ed2af47610e747db2823a0ad6eb7dbfad7ef98c.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
083d3eee7980bb0b8f28a0452ed2af47610e747db2823a0ad6eb7dbfad7ef98c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
08b9d4c93970927de49d4c012b62cf663a181a83afc9f6be03eac0afe0e736ff.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
08b9d4c93970927de49d4c012b62cf663a181a83afc9f6be03eac0afe0e736ff.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
08c1757fc2332f7d219bf2c7bff648ed78f51106e262e6e6f3ade6b0e847dff6.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
08c1757fc2332f7d219bf2c7bff648ed78f51106e262e6e6f3ade6b0e847dff6.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
0d08ee2ca8d53593d1394983068966c0f0f978afa9942e5df703f61a0579a9dd.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
0d08ee2ca8d53593d1394983068966c0f0f978afa9942e5df703f61a0579a9dd.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
0d1c17f83137538366a2ca9f2948458b00943a4b5033f5d0b9f25f85af36edd0.exe
Resource
win7-20241023-en
Behavioral task
behavioral14
Sample
0d1c17f83137538366a2ca9f2948458b00943a4b5033f5d0b9f25f85af36edd0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
1017f357d88223cb18ec43554b65f2ec3f2d67851c7723f3a21bf67d7f02f1c6.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
1017f357d88223cb18ec43554b65f2ec3f2d67851c7723f3a21bf67d7f02f1c6.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
152de8e813722eadbc25a08e1871382a887505388e03991595572bb632974e2e.exe
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
152de8e813722eadbc25a08e1871382a887505388e03991595572bb632974e2e.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
18a7c9bb155a24636fb7679c2c33562f66a85fa29949493d4a2dc31b0443321a.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
18a7c9bb155a24636fb7679c2c33562f66a85fa29949493d4a2dc31b0443321a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
1c429652e66bc481a2ce0309e4389cbcf93c1bd9727760d70418b9071a6818c5.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
1c429652e66bc481a2ce0309e4389cbcf93c1bd9727760d70418b9071a6818c5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
1fe8e976dc31ecc74c27018b3a7550e3c16c39b05f17237a39f59a1cf262330b.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
1fe8e976dc31ecc74c27018b3a7550e3c16c39b05f17237a39f59a1cf262330b.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
231f15571a7f90c6c74f0f6eb57a813a54fa927b5c13610e5d6ff680023852d3.exe
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
231f15571a7f90c6c74f0f6eb57a813a54fa927b5c13610e5d6ff680023852d3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
253a433e14fd88a5d504c492279fc0a4f192023768409738a11c17790499d66a.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
253a433e14fd88a5d504c492279fc0a4f192023768409738a11c17790499d66a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
26ccb116f44f24784c0c2e9e2f4f796b239ce96c34246b50194342c76fa3198f.exe
Resource
win7-20241023-en
Behavioral task
behavioral30
Sample
26ccb116f44f24784c0c2e9e2f4f796b239ce96c34246b50194342c76fa3198f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
2936e6b87d417380f2f28b8274f791a526d2dc7b2d9c014b80e8c88ab9ad2099.exe
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
2936e6b87d417380f2f28b8274f791a526d2dc7b2d9c014b80e8c88ab9ad2099.exe
Resource
win10v2004-20241007-en
General
-
Target
18a7c9bb155a24636fb7679c2c33562f66a85fa29949493d4a2dc31b0443321a.exe
-
Size
529KB
-
MD5
87ffa76ae480b1845120f7fbebe5f331
-
SHA1
27d0003fa504b69e89e4fe6bd9972d0924cbfd14
-
SHA256
18a7c9bb155a24636fb7679c2c33562f66a85fa29949493d4a2dc31b0443321a
-
SHA512
c19f13f5885fe5df81faaf765670058a14824f90b4d81ec5797cf6d4607ae11e4f7ee905ed3d1f7c2ecaae95d447929fe61f2b429308fdf0a95621351ddf3964
-
SSDEEP
12288:D69HG69f5XZgJBnvqxRbTtJhzqbFnoeZX/b9uXnTxZ:DUHGQf5iVva9tWbFnoeZPJuXnT
Malware Config
Extracted
cryptbot
-
payload_url
http://serfrloadg02.top/download.php?file=lv.exe
Signatures
-
CryptBot payload 6 IoCs
resource yara_rule behavioral19/memory/2384-2-0x0000000000330000-0x00000000003D0000-memory.dmp family_cryptbot behavioral19/memory/2384-3-0x0000000000400000-0x00000000004A3000-memory.dmp family_cryptbot behavioral19/memory/2384-4-0x0000000000400000-0x000000000052F000-memory.dmp family_cryptbot behavioral19/memory/2384-222-0x0000000000400000-0x000000000052F000-memory.dmp family_cryptbot behavioral19/memory/2384-223-0x0000000000330000-0x00000000003D0000-memory.dmp family_cryptbot behavioral19/memory/2384-224-0x0000000000400000-0x00000000004A3000-memory.dmp family_cryptbot -
Cryptbot family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 18a7c9bb155a24636fb7679c2c33562f66a85fa29949493d4a2dc31b0443321a.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 18a7c9bb155a24636fb7679c2c33562f66a85fa29949493d4a2dc31b0443321a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 18a7c9bb155a24636fb7679c2c33562f66a85fa29949493d4a2dc31b0443321a.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2384 18a7c9bb155a24636fb7679c2c33562f66a85fa29949493d4a2dc31b0443321a.exe 2384 18a7c9bb155a24636fb7679c2c33562f66a85fa29949493d4a2dc31b0443321a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\18a7c9bb155a24636fb7679c2c33562f66a85fa29949493d4a2dc31b0443321a.exe"C:\Users\Admin\AppData\Local\Temp\18a7c9bb155a24636fb7679c2c33562f66a85fa29949493d4a2dc31b0443321a.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
PID:2384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
46KB
MD501ad1027365ec4287b2c94507e1d356d
SHA117f9011712436049a8bf335236a3f526c0ded702
SHA256b710a091cd3aa96d96f21d2d8bbbafb1afc3fc73d057ffdf52d6da20098289d6
SHA512c548b83331449e4cb84a5bf123432cfa81267c8a344f10c6637fa504dd84570bc116f9fe4721e9df8e8080b3e0130cf28c31f57f19c0bc2f7103b871418e0b1f
-
Filesize
1KB
MD518d99c15a942305d365644b7096536bf
SHA1ebfc71778058be4f2a9cf830bf508e5caa5276e6
SHA256babba0c95aca5d8db0dd7268e0b3cb64e1741b863bef12af2c629a66c747dcf9
SHA51251b91bfc3e2204c98455d6f6c0ec3b02e4d82e2132ec76816001258c693b9b7345d38768e40aa2961fb966d7581f5cb7eecdbf29e6b71800b6a20bc710553484
-
Filesize
1KB
MD56a7f92aeee653fef9b57efcfd7d6858a
SHA18c5d9ce1fb39e28b45955947c8653a968289df23
SHA256cdd3624b078791b5f7a5fc641321e00e0b0e73eb0e75affbda4b36a3291e9ebd
SHA512285388ebbe319f57435aa5af3dc43a6e2dcb32da20f0a689dcdd5369ef8c1d02814fa387f7c4127d1470fcf194571565527927295034741bbd0917a1338c4257
-
Filesize
3KB
MD552f7b2b35a69df44f087f4bec9279ade
SHA184f4b4c4309e72056a245e6c317cf8d26534de79
SHA256fda44806b4a767c04fd6e19ea21b745903cddec70a1d2c4ecf780cadd19d30d4
SHA512eb4dfeeebc256a34e1a03da6f701ec62400e6a4883504ac8d6d7dcc377dc16b364bbf0339c03b594234d93129aa4c8a887fb8e9698c71db651db9bffaa9267be
-
Filesize
3KB
MD52c2243754b6e094e555171cfa7f8c182
SHA19a8318129aa5c6020f1bf0b5e9632836ad794c65
SHA2566c8683f31246753b7fdc8986d310ac21d94c0f5bbb3051952e407e28d5411d0c
SHA512621a4315447504e81f9f85a6db1e1d06b0f9efb9922b3fdb1b4b1638192c55bcda69593e2e345b44fabcff6853eeab7ec0b6c2878e9e8ea7437b75c3e5d630f6
-
Filesize
3KB
MD5ce90c1a56f2070dcd505a86ed389f362
SHA1f6dcdf514e27622b69a1fe445253caa234c92eea
SHA256050651927e053313415d7a597395ac5257f67aefed671b770a08a2d0cc5a3300
SHA51239b213a1147542521c446a2b30e2db901552251363d92abe4e5bac096b1667ce4a08b8a273f1ef20d5e82dd566252406deb4c4417e782b1fde10ee35c5d59a2e
-
Filesize
4KB
MD58ba855105258074ed53d37236e71e883
SHA161f14eec58833f1016ec1a1218222cac3227af70
SHA2562ee72b1afab3e45e17fb608f710a0140727cceafe267d5c086cd4d1434337594
SHA5129ecb2c4203bb621699fb63c2047e50c67ae62a6fb3010c65f6f490a8ffce7711734498d318439fc693df9c585958a99303e82c4eae268a6692617d2fa3578bb9
-
Filesize
52KB
MD55c500e7454fa77bc4021366d532c3b5b
SHA1b6980902d5a3044826ae81da60aaf552f4323744
SHA25645d0a65f4d9327beaa0fadbb94c0dae496ac04c4bab9bddc36f32b6025037054
SHA5123f2f633969153a63ba6b45e08fc0f22c0cdea72207236817db8c23f05b9094b5de081f0b8c2336b63d782c339b1cc01ec9dfe82b79bff3b6540ba274ede3c222
-
Filesize
1KB
MD5819d03116b40b99128f06c426d3bb70f
SHA1900259dfd7610bc922fc1e4e83fa4a0e61f6782d
SHA2567d7e30282273bec84b7c9c07916ac27b42b42b43a3701137ef310dfd3b20eda4
SHA5124024467b131b0fb66355ad1019d14f79616b34fe2d5cfc843d7153dc8743910779ab5d0ce1cffe69dad8f387ad1455d041c467c59db29bdc21c63b813fabb916
-
Filesize
3KB
MD5d6fe7c3262bc630bbd8def3b8e0486ef
SHA14b88227042b397c5636dcc0b32ea90555000e709
SHA256f090c2d2c12f41aab3ba1f5d50d7e3699f20ca8305f405caa4c1d73fdc36cc10
SHA5125338a2823df94d5b521ae93d35879c910629fbdfaa216839e507a010744799b0b3727c47228573fe691b71f778cd0cba0c4b6ef9f6b00fd46f8581d4fa644d4e
-
Filesize
5KB
MD501701dad40619754872284517acb82ac
SHA1b63c004eeb258a9a9f57f542493a6d6afa625e74
SHA256274d677e8c2afe4f8048d93a6357abc09752848c68fcab096cba3f79a3d16b34
SHA51246ab290186d22fdbcb7d162ac698060e1401f7fd11963b9cf715d3f062e193454433cb98a98888ca139f5f8001db18c6f801a793950acde1f588f8ca30b5284a