Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    20-11-2024 20:30

General

  • Target

    f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464.exe

  • Size

    6.3MB

  • MD5

    94ae98d3e8368e90f7777ee3df51da77

  • SHA1

    513b8681ac6088324731af512cb44ea49d223d27

  • SHA256

    f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464

  • SHA512

    945d77ed3e8aa250025b5d04ec60d06163c2556c0453d6c81af06031a1fd053c6cdc272bcfff71c0405375d669759b7e076122e490d5ad8c3fda7bfee9198f7c

  • SSDEEP

    196608:BH6U57641LiUDQVnzWG/VsqUaJlReG73o:F5+7UDc9ZE

Malware Config

Extracted

Family

cryptbot

C2

http://ivyzhi22.top/gate.php

Attributes
  • payload_url

    http://womozi02.top/agnize.dat

Signatures

  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Deletes itself 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464.exe
    "C:\Users\Admin\AppData\Local\Temp\f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464.exe"
    1⤵
    • Maps connected drives based on registry
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2168
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c timeout -t 5 && del "C:\Users\Admin\AppData\Local\Temp\f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464.exe"
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2896
      • C:\Windows\SysWOW64\timeout.exe
        timeout -t 5
        3⤵
        • System Location Discovery: System Language Discovery
        • Delays execution with timeout.exe
        PID:2352

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\6281.tmp

    Filesize

    32B

    MD5

    39cda95fe49d28ce7087ace6a1b0b67e

    SHA1

    38864c772c13fc9c208070c65095e2afa8bb6977

    SHA256

    2857ced3626cdd078a1609a6b1795b141e454f861139b06f842ac0986c62fd7c

    SHA512

    769f50af2b06c700b6c61763ae97e773a9ed0f3c5538d538e73086e44c5d7eeed59e92f0a97a41ba813bd8348f02c0e82d7ac490e60554843e2bae72f5970d62

  • C:\Users\Admin\AppData\Local\Temp\6311.tmp

    Filesize

    155KB

    MD5

    3f3df8b5655b5bc1e58a4a5830f495d0

    SHA1

    313ef428c1944942c31385a0698dde24a099c8bf

    SHA256

    8b35bc8740f95803c8c68d42612fce8afde77e8a5e8e8e15894e51275e47175c

    SHA512

    6921e6542244ad9f32c93a733e6b2c2b799d0a2276fb2d73dc70a2863de752f682dec13ae30d75b4e03d64dc5be88f6cb51f9dce560ecf41c765dc51cf2edc59

  • memory/2168-0-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2168-2-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2168-4-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2168-6-0x00000000004B6000-0x00000000007C3000-memory.dmp

    Filesize

    3.1MB

  • memory/2168-9-0x0000000000400000-0x0000000000E16000-memory.dmp

    Filesize

    10.1MB

  • memory/2168-10-0x0000000000400000-0x0000000000E16000-memory.dmp

    Filesize

    10.1MB

  • memory/2168-81-0x00000000004B6000-0x00000000007C3000-memory.dmp

    Filesize

    3.1MB

  • memory/2168-82-0x0000000000400000-0x0000000000E16000-memory.dmp

    Filesize

    10.1MB

  • memory/2168-83-0x0000000000400000-0x0000000000E16000-memory.dmp

    Filesize

    10.1MB

  • memory/2168-84-0x00000000004B6000-0x00000000007C3000-memory.dmp

    Filesize

    3.1MB