Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08-11-2024 06:43

General

  • Target

    253a433e14fd88a5d504c492279fc0a4f192023768409738a11c17790499d66a.exe

  • Size

    583KB

  • MD5

    004f3bd262190bd79a6a90744be507c9

  • SHA1

    069a52de16b7f52f7de55cee23689212a0695736

  • SHA256

    253a433e14fd88a5d504c492279fc0a4f192023768409738a11c17790499d66a

  • SHA512

    64004a74065783d888066660f77a216dbb0c23f6a1b319ea66410fcd19aa13c82a79386f83e220ea53a2458d6a64aba4ea3453d137fa55fd236b1d7c2ae2c4b9

  • SSDEEP

    12288:5NRddvGBjE0F4OQkviP2k4eE3TRVROKDsH6Bx4BO7aG:nRcAvOQgwYzO6Qlya

Malware Config

Extracted

Family

cryptbot

C2

basessrn17.top

Attributes
  • payload_url

    http://dfgggloadt11.top/download.php?file=lv.exe

Signatures

  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • CryptBot payload 6 IoCs
  • Cryptbot family
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of FindShellTrayWindow 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\253a433e14fd88a5d504c492279fc0a4f192023768409738a11c17790499d66a.exe
    "C:\Users\Admin\AppData\Local\Temp\253a433e14fd88a5d504c492279fc0a4f192023768409738a11c17790499d66a.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious use of FindShellTrayWindow
    PID:2616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\GgIFodiI\WSOGWnVpPzqm8.zip

    Filesize

    36KB

    MD5

    f462ff2b77fa7b6977a4bca5588bc540

    SHA1

    a936a6939db99f94b7aeb80757909d905e3548c2

    SHA256

    6ee50f1055c3672c4dd2c5336e02d56443824b434318ca1d7533f54a95cf7a2f

    SHA512

    e6967503672aedf2cf73c966ad3e8bff4d2306748b2629b1fec6340178fbd348912b3b550eaaafb843ed1bf5685795e6e3a47145eae5c83408f31c4ca6f5a572

  • C:\Users\Admin\AppData\Local\Temp\GgIFodiI\_Files\_Information.txt

    Filesize

    8KB

    MD5

    55f067c761be97fdfcdee685d28dcc72

    SHA1

    c42674dd84086d02a052d3995648a0672ebf0574

    SHA256

    feae4808b816dba5ee8346b0933b6bae209764017f6bef4e468a23fb3d4a4147

    SHA512

    c862e504af35ef9158b4a5157a44083719bbae47fdce873ffd690bc91d9c47d4b58282237c7ec6d50e91c4643d35f4ea0da606d03e34f7797577f24530813335

  • C:\Users\Admin\AppData\Local\Temp\GgIFodiI\_Files\_Screen_Desktop.jpeg

    Filesize

    43KB

    MD5

    52a76bcfa17c99d01a5b59cbba2aed62

    SHA1

    e7689d10a84f83283f2c40e4a0da14e8fd0bf642

    SHA256

    6799ddc6ee8cb096d0e23058b699b13cc877fefd37e0c0611ca27706c8fa79ff

    SHA512

    7d2c04858d094cbf13491b7c2e8dbac208bfa83c9b3ebd9686e6c6e7eba70fd5e85a8a8d332f9fb1488be334738f12b97e044947d1b23ed2d50e86ad3af9db74

  • C:\Users\Admin\AppData\Local\Temp\GgIFodiI\files_\system_info.txt

    Filesize

    1KB

    MD5

    412723766fba16535c4dc04b5ab1ffbc

    SHA1

    e1a9ddb546f3d5f40f564d9e6ae8c16b41b2eefa

    SHA256

    460379f98f712ba8106a2489d35da51de90d46d306a89e57e6c088fe4043c43e

    SHA512

    031e5fbee9d1552aec12aebeddb164a5261d534d52950d80b3548014572e3dab9dda4719af22fcf59303d0ac351aaa51b2aadef65e30a41b203ae7cab89773d7

  • C:\Users\Admin\AppData\Local\Temp\GgIFodiI\files_\system_info.txt

    Filesize

    5KB

    MD5

    f7e600180646f8020b2c184fa42139bd

    SHA1

    fb49032c5d0dc688ce83aa82de5cd14ed302c6f8

    SHA256

    a12e414eaee7022062aa042ab2098d2b01747f4e6ba09908b7b9860e5022ca07

    SHA512

    289b471f9c4309140add9bb2b4599bdd52ae0a7bc997cdca55cf819a75342d0f68e8567f8fd067490f09579ce97eb591433139bc57a7cd993b9b7af85536d0d7

  • memory/2616-1-0x0000000000400000-0x00000000051B5000-memory.dmp

    Filesize

    77.7MB

  • memory/2616-3-0x0000000000400000-0x00000000004A3000-memory.dmp

    Filesize

    652KB

  • memory/2616-2-0x0000000000220000-0x00000000002C0000-memory.dmp

    Filesize

    640KB

  • memory/2616-4-0x0000000000400000-0x00000000051B5000-memory.dmp

    Filesize

    77.7MB

  • memory/2616-113-0x0000000000400000-0x00000000051B5000-memory.dmp

    Filesize

    77.7MB

  • memory/2616-222-0x0000000000400000-0x00000000051B5000-memory.dmp

    Filesize

    77.7MB

  • memory/2616-225-0x0000000000400000-0x00000000004A3000-memory.dmp

    Filesize

    652KB