Analysis
-
max time kernel
94s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 20:30
Static task
static1
Behavioral task
behavioral1
Sample
f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464.exe
Resource
win7-20240708-en
General
-
Target
f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464.exe
-
Size
6.3MB
-
MD5
94ae98d3e8368e90f7777ee3df51da77
-
SHA1
513b8681ac6088324731af512cb44ea49d223d27
-
SHA256
f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464
-
SHA512
945d77ed3e8aa250025b5d04ec60d06163c2556c0453d6c81af06031a1fd053c6cdc272bcfff71c0405375d669759b7e076122e490d5ad8c3fda7bfee9198f7c
-
SSDEEP
196608:BH6U57641LiUDQVnzWG/VsqUaJlReG73o:F5+7UDc9ZE
Malware Config
Extracted
cryptbot
http://ivyzhi22.top/gate.php
-
payload_url
http://womozi02.top/agnize.dat
Signatures
-
Cryptbot family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1360 timeout.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2440 f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464.exe 2440 f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464.exe 2440 f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464.exe 2440 f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2440 wrote to memory of 1904 2440 f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464.exe 99 PID 2440 wrote to memory of 1904 2440 f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464.exe 99 PID 2440 wrote to memory of 1904 2440 f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464.exe 99 PID 1904 wrote to memory of 1360 1904 cmd.exe 101 PID 1904 wrote to memory of 1360 1904 cmd.exe 101 PID 1904 wrote to memory of 1360 1904 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464.exe"C:\Users\Admin\AppData\Local\Temp\f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout -t 5 && del "C:\Users\Admin\AppData\Local\Temp\f667ab33b49d8b8389e116a05849032cc2e78a7578b12cdd07ed89a931c3c464.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\timeout.exetimeout -t 53⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1360
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32B
MD539b6370997409b97ddc041e443c9ceef
SHA130c7aea10e33fd73307970f46dca78263fb7de5f
SHA25663af70ff74d466e63001c800c82449c93bcf08a2c240587330066980be948c40
SHA5125a3947786060ad7aeb5f8ee7bccdc6eccf48e73a9f0499712c074cda78c0800207aee264e94878033c23f8fb2bb349af307084c8dd57ef4b9d394b06c484550f
-
Filesize
116KB
MD5a0b00443f5a134c95ca43dc41e6dd095
SHA13f734b453265ecacf1f661ba4843e3f3f739225b
SHA2560b66864d5e1709fd9163da7627a422a43856e8b3251dc571df9f6a3993947b7e
SHA5128460158d0d0220aef1ccb1c68f956bbc82734bdb959b620fe38375526890a7f3c8a92777fdcfc1a40e1101209820e01d344b89348227bea16d10e9ae1af73f7f
-
Filesize
8KB
MD57520956b737e2ddcbbf4585661df8657
SHA1b04b79181f63f6bef16a09c0ddcb00cef50ca9d4
SHA256a921e2dbabd5d15f0080ea3517db28e1599c2cd1de4559f567f285cc463741f4
SHA51244f5bb4bb4eb1d2736f3c32bf067d708de1c9d01f2d5506d5c80a98a1632de8897d58ccb7166d15f720d63b56d3e9bdea0ac6fa5c9f1fef74f52e3a241b6b3ad