Overview
overview
10Static
static
5file.exe
windows7-x64
10file.exe
windows10-2004-x64
10lv copy.exe
windows7-x64
9lv copy.exe
windows10-2004-x64
9$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
34_ico.exe
windows7-x64
94_ico.exe
windows10-2004-x64
96_ico.exe
windows7-x64
96_ico.exe
windows10-2004-x64
9vpn_ico.exe
windows7-x64
9vpn_ico.exe
windows10-2004-x64
9lv.exe
windows7-x64
9lv.exe
windows10-2004-x64
9$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
34_ico.exe
windows7-x64
94_ico.exe
windows10-2004-x64
96_ico.exe
windows7-x64
96_ico.exe
windows10-2004-x64
9Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-11-2024 14:02
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
lv copy.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
lv copy.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
4_ico.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
4_ico.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
6_ico.exe
Resource
win7-20241023-en
Behavioral task
behavioral16
Sample
6_ico.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
vpn_ico.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
vpn_ico.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
lv.exe
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
lv.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
4_ico.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
4_ico.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
6_ico.exe
Resource
win7-20241010-en
General
-
Target
file.exe
-
Size
667KB
-
MD5
bd71cacc925d19e97841949480825962
-
SHA1
69e0bd8773accf91b5374af59394749624f21bc5
-
SHA256
c0e25e1afb6e8457a95d10a96a7e97191821b698481f9c73cb8468e09723e15c
-
SHA512
ae162ec70ccb8857f30eb22aae6b7bc3b851a246ff5e0418bef96f72569497cbf4fdb0200d5d9327e67be9f8c9f1353bc1c920854412c9b33aeb86ce0882b465
-
SSDEEP
12288:CextvP96hExo7PTMoHbeMGpkEBuxubk6BXrwYewmBFml1ihhCJ4VLt8/nWnDEFX:CevP96hExIivkEW3WXkYdOFmPihIkt87
Malware Config
Extracted
cryptbot
eressedb12.top
morttttk11.top
-
payload_url
http://dowhhad06.top/download.php?file=lv.exe
Signatures
-
CryptBot payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/3892-2-0x00000000049E0000-0x0000000004A80000-memory.dmp family_cryptbot behavioral2/memory/3892-3-0x0000000000400000-0x00000000004A3000-memory.dmp family_cryptbot behavioral2/memory/3892-217-0x0000000000400000-0x000000000481F000-memory.dmp family_cryptbot behavioral2/memory/3892-220-0x00000000049E0000-0x0000000004A80000-memory.dmp family_cryptbot behavioral2/memory/3892-221-0x0000000000400000-0x00000000004A3000-memory.dmp family_cryptbot -
Cryptbot family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
resource yara_rule behavioral2/memory/3892-0-0x0000000000400000-0x000000000481F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
file.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
file.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString file.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 file.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
file.exepid Process 3892 file.exe 3892 file.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD52ca4b2f5e41a7b3d3128cc6d6f944d7c
SHA1c3c162fa2a8f5a2675a5e9ca82613474ff550741
SHA256d83e73baec4fc8bebb17a6a5dbf6068b52c4710ee879fb021c2310f70cb08dca
SHA5126893884c26d39445c9a593236b6e3b3408ac58fee5d6dd5fb78a2740f12ac0e2a0c21f749d61d23903f0d00ca8af32c5d5030b5838abbf11ee56c07833bcd969
-
Filesize
41KB
MD5e71275c4f4026d8ac8c4e8681348a526
SHA16df00d9a6f48c01ce5e2d21188c4294a71555c82
SHA2563e337849b8e5816afd353316447f7c84c06e38303163e87eacede939cab91ef0
SHA512eed37af8b794323f9d7ce04358efbb7330a7c72b53ce30c127102be20fdbcf93539d14c8d5364149af39cf8e2081d72dcb6b3fd7d748c533d4f8712837d434c5
-
Filesize
7KB
MD56396d79996c9b203e95b2a7dd49d8e2c
SHA16a549fdee3dd5e8514b906179754276916e28c3b
SHA25678346241b78c3e72788c7107d73116c640c39ae11d68a23aab4a2dc7fd2ead8f
SHA512d7b4c5a35121fc73dbad7dedabe4e51fcbb8d49bd2cac5e1ba88f4c83be0e8e8c7d39ce1d965bfb1f273603a18ba30db77fd956d7530b990d94f14e8863a16b2
-
Filesize
47KB
MD5918588c065fa70c886e774aa1087cc2d
SHA1e83aedb2ff7db9b8a9237c051f0c7ba6ce9a055c
SHA2563019fd1cd714a10efd7c0721403aa0f2fb19cad64408e982997e76ce92655fd9
SHA5122d0f3923e1a6000b1ec354b96ecc83638d7580557ba29a7ac472ec8b555cd83fc3a6831ed722118ee717e2994692ae258f020d9420f01df9b803cdf8b533f3a0
-
Filesize
662B
MD5bf9a0c437c6d8fbe5bfb6bc443b4874c
SHA12067e9ba915a317d70c3296441e58bccb34fe6cc
SHA256bb202073484f6649ec7211fc5a446c0f585f508167658bcc1c5bad40e09643b3
SHA51201479ee4208787dc786d00f92a56761e86cb8a83f9a3cc07fc6b4008a5c29ebc5300c03c5405025edc883f875bdd9c9dedb9eb9cc10c932e1b16074b1b83d0fb
-
Filesize
4KB
MD5358000d6a563f6ba70b27177eadf5b20
SHA1c2ad156ab7d5d1fe7c9ad0e36e7b422d038fe8da
SHA256f2eac41e183b1ee9256a3b0748b56dcfe4239204e43f72d5d594d1b978e72506
SHA51229390fb0622fa4eca353998a4a13958c3f5485cb374652b72e6109d6742b8843e1feddb91ea7833600131c9150f176334b7773706ad0d12c4df7aa954bb6eb98