Analysis
-
max time kernel
119s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 02:35
Static task
static1
Behavioral task
behavioral1
Sample
fa2e957273059aeebb840921dbbc8857115eeb0277dfad5716b70b26a23aa820.exe
Resource
win7-20241010-en
General
-
Target
fa2e957273059aeebb840921dbbc8857115eeb0277dfad5716b70b26a23aa820.exe
-
Size
347KB
-
MD5
ca5faa77d0bc3a6e946b0b225aef3cb2
-
SHA1
f604e5b34395b7bbacb23ad6de49b396ad43e4d0
-
SHA256
fa2e957273059aeebb840921dbbc8857115eeb0277dfad5716b70b26a23aa820
-
SHA512
8e4146fdcdc681640901100b363e94e1133e11ee2975509d5dfd443f49c0a9d2ab65ed10aad5358c139dbfc0cff7db9a4f2d2edc9ee37cb50bf1677f39231c36
-
SSDEEP
6144:ZLNfr9ti3Q7FnY3gH+X+0qH77kliXQIxZetZvuyLEHyglIADG8elA:Zhfrbi3Qt+WKBk7giXQfaXxDv
Malware Config
Extracted
cryptbot
veoalm42.top
moruhx04.top
-
payload_url
http://tynjua14.top/download.php?file=lv.exe
Signatures
-
Cryptbot family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
fa2e957273059aeebb840921dbbc8857115eeb0277dfad5716b70b26a23aa820.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fa2e957273059aeebb840921dbbc8857115eeb0277dfad5716b70b26a23aa820.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
fa2e957273059aeebb840921dbbc8857115eeb0277dfad5716b70b26a23aa820.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 fa2e957273059aeebb840921dbbc8857115eeb0277dfad5716b70b26a23aa820.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString fa2e957273059aeebb840921dbbc8857115eeb0277dfad5716b70b26a23aa820.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa2e957273059aeebb840921dbbc8857115eeb0277dfad5716b70b26a23aa820.exe"C:\Users\Admin\AppData\Local\Temp\fa2e957273059aeebb840921dbbc8857115eeb0277dfad5716b70b26a23aa820.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5be819630d05abbe0027586acc86ec0ee
SHA1f0baf02c470149fce09c11c0dc2d527f0f8810f7
SHA256a5ac83b79041b07247677e0e141b6ced360a74f767eb8818e730c0b56f8f7fe2
SHA51239e43f2b8bfdcfcd78c83a9170b31a5f0b11e834455cd418ae1c46d2514f43cbe02fe0d5a3f7b0d9d6fabee16b8c310fb32e36e4bc2344d99b15b4f97ee64f61
-
Filesize
1024KB
MD535f45815d35df6f05da9092a702d9b3c
SHA1718e1d29eba0d2946f1fb222208f557510c575cb
SHA256365892642679a7ade9cd15a03e46ac6760ba5118b735fa95d194e7084b21ebf1
SHA512223b13ebd966f354766df50c0e0774d38283e8b19001e621085c2de8553aedd6e9c72c10ac8694f5002f9e69edac69cb4977e3492955ea6a97fd36a66fbf8c4d
-
Filesize
1KB
MD57115c4a142906d8cbf459a1bbcd9fab8
SHA13574a50e692fedc5d3d997b49a50d668f65050de
SHA25656c57eb261651ef8b1c98f2b237e514aa0a0b5c93f6b24c0ae21359305d36c59
SHA5127229ef547011f0e428cdf8237d4bb30eb8faab31bed330a690371bdd329029a039444ab6c9bc9f52da5818fb703d6438f4bd154dd6c5dc88e857190214dae0b4
-
Filesize
3KB
MD576b27a62c915338c0e313ece5bdc69e8
SHA16003a3cf4c9e4e96b9223ce8ea155fbd3d565882
SHA256151469f822f4cb3de58f62f29def7eda550b55942a9791499bdc9cf0dbf397c7
SHA5123691f4d2ea4aafcdaf526449d01ee0e408ef437c894cace1c054fb4b5088936f85dff897212cd9d37965f2c15ae96df4f7e6be1bbe1a853ee02d20edcf244ba2
-
Filesize
4KB
MD5cd327f37b28c0a05e5a4d599b8aaf278
SHA11d82e8bc880b0b810b49e49cc11275b07155ec5d
SHA256387ef39e6a16699f1083b5307d395d118c0a6964a24dc8dc0bb524d41489cca4
SHA512d27a80dd3879024d5c9d6e9b975f49c889b5680e1131f277a237a450e106918dc5896a705d1af093aaddde4895e7a151a82d599f9ad204c667eaf4dd52a77626
-
Filesize
52KB
MD58cad22be94cc22fbf154046de86e7022
SHA1b4eb71f38a8478067080a858fd70a2a44e7716ff
SHA256f5a28b61fef0ea62fe2f8a527bd5a4c923a143159466429ddb2289f8730520d4
SHA512300e8278d1472bdc18929cb4db9f87ace9a2812c13c897b0b8035f855c076ee9ad6dd28b5f5111ff8b3c9f7dc618db879cc2bfbee97361ee077be3c36f086a92