Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 20:30
Static task
static1
Behavioral task
behavioral1
Sample
f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464.exe
Resource
win7-20240708-en
General
-
Target
f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464.exe
-
Size
6.3MB
-
MD5
94ae98d3e8368e90f7777ee3df51da77
-
SHA1
513b8681ac6088324731af512cb44ea49d223d27
-
SHA256
f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464
-
SHA512
945d77ed3e8aa250025b5d04ec60d06163c2556c0453d6c81af06031a1fd053c6cdc272bcfff71c0405375d669759b7e076122e490d5ad8c3fda7bfee9198f7c
-
SSDEEP
196608:BH6U57641LiUDQVnzWG/VsqUaJlReG73o:F5+7UDc9ZE
Malware Config
Extracted
cryptbot
http://ivyzhi22.top/gate.php
-
payload_url
http://womozi02.top/agnize.dat
Signatures
-
Cryptbot family
-
Deletes itself 1 IoCs
pid Process 2896 cmd.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2352 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2168 f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464.exe 2168 f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2896 2168 f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464.exe 31 PID 2168 wrote to memory of 2896 2168 f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464.exe 31 PID 2168 wrote to memory of 2896 2168 f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464.exe 31 PID 2168 wrote to memory of 2896 2168 f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464.exe 31 PID 2896 wrote to memory of 2352 2896 cmd.exe 33 PID 2896 wrote to memory of 2352 2896 cmd.exe 33 PID 2896 wrote to memory of 2352 2896 cmd.exe 33 PID 2896 wrote to memory of 2352 2896 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464.exe"C:\Users\Admin\AppData\Local\Temp\f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464.exe"1⤵
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout -t 5 && del "C:\Users\Admin\AppData\Local\Temp\f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\timeout.exetimeout -t 53⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2352
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32B
MD539cda95fe49d28ce7087ace6a1b0b67e
SHA138864c772c13fc9c208070c65095e2afa8bb6977
SHA2562857ced3626cdd078a1609a6b1795b141e454f861139b06f842ac0986c62fd7c
SHA512769f50af2b06c700b6c61763ae97e773a9ed0f3c5538d538e73086e44c5d7eeed59e92f0a97a41ba813bd8348f02c0e82d7ac490e60554843e2bae72f5970d62
-
Filesize
155KB
MD53f3df8b5655b5bc1e58a4a5830f495d0
SHA1313ef428c1944942c31385a0698dde24a099c8bf
SHA2568b35bc8740f95803c8c68d42612fce8afde77e8a5e8e8e15894e51275e47175c
SHA5126921e6542244ad9f32c93a733e6b2c2b799d0a2276fb2d73dc70a2863de752f682dec13ae30d75b4e03d64dc5be88f6cb51f9dce560ecf41c765dc51cf2edc59