Overview
overview
10Static
static
5078db59624...6d.exe
windows7-x64
10078db59624...6d.exe
windows10-2004-x64
1007f59c1814...17.exe
windows7-x64
1007f59c1814...17.exe
windows10-2004-x64
10083d3eee79...8c.exe
windows7-x64
10083d3eee79...8c.exe
windows10-2004-x64
1008b9d4c939...ff.exe
windows7-x64
1008b9d4c939...ff.exe
windows10-2004-x64
1008c1757fc2...f6.exe
windows7-x64
1008c1757fc2...f6.exe
windows10-2004-x64
100d08ee2ca8...dd.exe
windows7-x64
100d08ee2ca8...dd.exe
windows10-2004-x64
100d1c17f831...d0.exe
windows7-x64
100d1c17f831...d0.exe
windows10-2004-x64
101017f357d8...c6.exe
windows7-x64
101017f357d8...c6.exe
windows10-2004-x64
10152de8e813...2e.exe
windows7-x64
10152de8e813...2e.exe
windows10-2004-x64
1018a7c9bb15...1a.exe
windows7-x64
1018a7c9bb15...1a.exe
windows10-2004-x64
101c429652e6...c5.exe
windows7-x64
101c429652e6...c5.exe
windows10-2004-x64
101fe8e976dc...0b.exe
windows7-x64
71fe8e976dc...0b.exe
windows10-2004-x64
7231f15571a...d3.exe
windows7-x64
10231f15571a...d3.exe
windows10-2004-x64
10253a433e14...6a.exe
windows7-x64
10253a433e14...6a.exe
windows10-2004-x64
1026ccb116f4...8f.exe
windows7-x64
1026ccb116f4...8f.exe
windows10-2004-x64
102936e6b87d...99.exe
windows7-x64
102936e6b87d...99.exe
windows10-2004-x64
10Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 06:43
Behavioral task
behavioral1
Sample
078db59624b35fe4dd0fe0420bd99bd349aa053ef07c982fdc6a58effd96c76d.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
078db59624b35fe4dd0fe0420bd99bd349aa053ef07c982fdc6a58effd96c76d.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
07f59c1814f6b5d712b6bd55b180bd9d69890eb337b44977749a59bf39958b17.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
07f59c1814f6b5d712b6bd55b180bd9d69890eb337b44977749a59bf39958b17.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
083d3eee7980bb0b8f28a0452ed2af47610e747db2823a0ad6eb7dbfad7ef98c.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
083d3eee7980bb0b8f28a0452ed2af47610e747db2823a0ad6eb7dbfad7ef98c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
08b9d4c93970927de49d4c012b62cf663a181a83afc9f6be03eac0afe0e736ff.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
08b9d4c93970927de49d4c012b62cf663a181a83afc9f6be03eac0afe0e736ff.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
08c1757fc2332f7d219bf2c7bff648ed78f51106e262e6e6f3ade6b0e847dff6.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
08c1757fc2332f7d219bf2c7bff648ed78f51106e262e6e6f3ade6b0e847dff6.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
0d08ee2ca8d53593d1394983068966c0f0f978afa9942e5df703f61a0579a9dd.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
0d08ee2ca8d53593d1394983068966c0f0f978afa9942e5df703f61a0579a9dd.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
0d1c17f83137538366a2ca9f2948458b00943a4b5033f5d0b9f25f85af36edd0.exe
Resource
win7-20241023-en
Behavioral task
behavioral14
Sample
0d1c17f83137538366a2ca9f2948458b00943a4b5033f5d0b9f25f85af36edd0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
1017f357d88223cb18ec43554b65f2ec3f2d67851c7723f3a21bf67d7f02f1c6.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
1017f357d88223cb18ec43554b65f2ec3f2d67851c7723f3a21bf67d7f02f1c6.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
152de8e813722eadbc25a08e1871382a887505388e03991595572bb632974e2e.exe
Resource
win7-20240729-en
Behavioral task
behavioral18
Sample
152de8e813722eadbc25a08e1871382a887505388e03991595572bb632974e2e.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
18a7c9bb155a24636fb7679c2c33562f66a85fa29949493d4a2dc31b0443321a.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
18a7c9bb155a24636fb7679c2c33562f66a85fa29949493d4a2dc31b0443321a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
1c429652e66bc481a2ce0309e4389cbcf93c1bd9727760d70418b9071a6818c5.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
1c429652e66bc481a2ce0309e4389cbcf93c1bd9727760d70418b9071a6818c5.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
1fe8e976dc31ecc74c27018b3a7550e3c16c39b05f17237a39f59a1cf262330b.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
1fe8e976dc31ecc74c27018b3a7550e3c16c39b05f17237a39f59a1cf262330b.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
231f15571a7f90c6c74f0f6eb57a813a54fa927b5c13610e5d6ff680023852d3.exe
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
231f15571a7f90c6c74f0f6eb57a813a54fa927b5c13610e5d6ff680023852d3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
253a433e14fd88a5d504c492279fc0a4f192023768409738a11c17790499d66a.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
253a433e14fd88a5d504c492279fc0a4f192023768409738a11c17790499d66a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
26ccb116f44f24784c0c2e9e2f4f796b239ce96c34246b50194342c76fa3198f.exe
Resource
win7-20241023-en
Behavioral task
behavioral30
Sample
26ccb116f44f24784c0c2e9e2f4f796b239ce96c34246b50194342c76fa3198f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
2936e6b87d417380f2f28b8274f791a526d2dc7b2d9c014b80e8c88ab9ad2099.exe
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
2936e6b87d417380f2f28b8274f791a526d2dc7b2d9c014b80e8c88ab9ad2099.exe
Resource
win10v2004-20241007-en
General
-
Target
18a7c9bb155a24636fb7679c2c33562f66a85fa29949493d4a2dc31b0443321a.exe
-
Size
529KB
-
MD5
87ffa76ae480b1845120f7fbebe5f331
-
SHA1
27d0003fa504b69e89e4fe6bd9972d0924cbfd14
-
SHA256
18a7c9bb155a24636fb7679c2c33562f66a85fa29949493d4a2dc31b0443321a
-
SHA512
c19f13f5885fe5df81faaf765670058a14824f90b4d81ec5797cf6d4607ae11e4f7ee905ed3d1f7c2ecaae95d447929fe61f2b429308fdf0a95621351ddf3964
-
SSDEEP
12288:D69HG69f5XZgJBnvqxRbTtJhzqbFnoeZX/b9uXnTxZ:DUHGQf5iVva9tWbFnoeZPJuXnT
Malware Config
Extracted
cryptbot
-
payload_url
http://serfrloadg02.top/download.php?file=lv.exe
Signatures
-
CryptBot payload 5 IoCs
resource yara_rule behavioral20/memory/3140-2-0x00000000007B0000-0x0000000000850000-memory.dmp family_cryptbot behavioral20/memory/3140-3-0x0000000000400000-0x00000000004A3000-memory.dmp family_cryptbot behavioral20/memory/3140-225-0x00000000007B0000-0x0000000000850000-memory.dmp family_cryptbot behavioral20/memory/3140-224-0x0000000000400000-0x000000000052F000-memory.dmp family_cryptbot behavioral20/memory/3140-226-0x0000000000400000-0x00000000004A3000-memory.dmp family_cryptbot -
Cryptbot family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 18a7c9bb155a24636fb7679c2c33562f66a85fa29949493d4a2dc31b0443321a.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 18a7c9bb155a24636fb7679c2c33562f66a85fa29949493d4a2dc31b0443321a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 18a7c9bb155a24636fb7679c2c33562f66a85fa29949493d4a2dc31b0443321a.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3140 18a7c9bb155a24636fb7679c2c33562f66a85fa29949493d4a2dc31b0443321a.exe 3140 18a7c9bb155a24636fb7679c2c33562f66a85fa29949493d4a2dc31b0443321a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\18a7c9bb155a24636fb7679c2c33562f66a85fa29949493d4a2dc31b0443321a.exe"C:\Users\Admin\AppData\Local\Temp\18a7c9bb155a24636fb7679c2c33562f66a85fa29949493d4a2dc31b0443321a.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
PID:3140
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
505KB
MD522b3b5ba3d06c347e128e8e231db66ff
SHA1c87b20261cb0852c52c061caebd6e49d31e2c6c3
SHA256e958945142fedafaeb6e46bb49a5d48153fb103d19b8b2be147750f254ae2793
SHA51248a4402c87273ad6f2673745b67ea124f7a4ba24d72b9e8c4f77eabb76df93574353cdfae3f03b329e518164dec906d7a7bea61052cd9516955d8ccb2aab66ae
-
Filesize
459KB
MD509f79ca4b3356d9c5c4589bde59ca492
SHA16502ecf4baac9259cd2cca6cb46289f0d8bb3f16
SHA2566445e7509d43af45301f7c11821c4c4e44399111e51e532fb2ed690de95df4ce
SHA5124f0ba86d6ce417700b1cd1e886da6d197eca9755a152e1a8b0d764dde020f678c7efecef722d00c1b2ae6f5a563fc6392aa328d981631467dd1148a46ed27dac
-
Filesize
7KB
MD5608bfa1d367daf50d0cec2d64e9962f2
SHA1a0362210804130a0f1fdbd725796adf0e270beff
SHA2560f48e960b2f1fa7c749cf1c29515393bd2659efdb4542794bc4a6a37a96cb471
SHA512a1b96371ea83be0d748a89d300d2cee0416cd6dec0e71c220feb33b3c06e6e5dc73c9cd10d1e04bcb9bbb3c134bd761da6fa01e3e2e50027898cbceee421222c
-
Filesize
51KB
MD5dedcde8de4b6b64bd0f5e371ff3c083b
SHA187e7d0839cfc9b33640c1732a576a78ac1e94a92
SHA256f13bd39c581362fcd9eaaf978c1527f535e38d5d4ea39ceb7ce4df92a643508c
SHA5127e6771f1bbdb382570936b851b682dc726f9d37670b45453f2420db60e170706e0a563a6ce91f5a4bd39f37dba8a297e0396c21f0feb3c95e67ce02828c7a366
-
Filesize
2KB
MD5233bc14eaba21d80927a9b552266d3f4
SHA1ab06c097f3596ae91022117cb0befa854af1bcb8
SHA25600c338995131db9eea9c087097189de439aee2487d7e981821b7c75e931b53f0
SHA512ca9c272c7d80ca997dba82f25002cb13e039cc1a58369bbe5748a1a8206ea497fa287cd77447845d308e41a07c605808c1895efd00a172b9668b68782fac1208
-
Filesize
4KB
MD502cf311a5e273802dc6878211d2b8dd5
SHA14c54ad41bdcda47a3f597a013f478241bbe81fc5
SHA256c284e51dc73f37280c6849304e27398b8623c54fe85da9c51352e86848d3df56
SHA51204baddb9eed7658f16910e8366cc2a32c470a749b6a97f2fa01613bbdc95e880adedcabdbf21b5c7d65c05c772830424caedcabd30fa19a690bb5794648f54b1
-
Filesize
505KB
MD53e8c022d6bb37a47220d18c3dffec48d
SHA1575a45d5b782a262e15a3d1c2ea6d1cb05c69c45
SHA2569efb7f4bbc787b03b9a2b019d3d125a5f7545e5ebe350f4dd372728955c45241
SHA5125ba0714f943cb59d451f2a839bbd64172296216c5aea89d19cc16e4ff2fd7d12e728d5e452f438984279ed071cd7b7d7cf9b3416491086d9b7a888c8d1cc3b3b