Analysis
-
max time kernel
148s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 02:47
Static task
static1
Behavioral task
behavioral1
Sample
fa2e957273059aeebb840921dbbc8857115eeb0277dfad5716b70b26a23aa820.exe
Resource
win7-20241010-en
General
-
Target
fa2e957273059aeebb840921dbbc8857115eeb0277dfad5716b70b26a23aa820.exe
-
Size
347KB
-
MD5
ca5faa77d0bc3a6e946b0b225aef3cb2
-
SHA1
f604e5b34395b7bbacb23ad6de49b396ad43e4d0
-
SHA256
fa2e957273059aeebb840921dbbc8857115eeb0277dfad5716b70b26a23aa820
-
SHA512
8e4146fdcdc681640901100b363e94e1133e11ee2975509d5dfd443f49c0a9d2ab65ed10aad5358c139dbfc0cff7db9a4f2d2edc9ee37cb50bf1677f39231c36
-
SSDEEP
6144:ZLNfr9ti3Q7FnY3gH+X+0qH77kliXQIxZetZvuyLEHyglIADG8elA:Zhfrbi3Qt+WKBk7giXQfaXxDv
Malware Config
Extracted
cryptbot
veoalm42.top
moruhx04.top
-
payload_url
http://tynjua14.top/download.php?file=lv.exe
Signatures
-
Cryptbot family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fa2e957273059aeebb840921dbbc8857115eeb0277dfad5716b70b26a23aa820.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 fa2e957273059aeebb840921dbbc8857115eeb0277dfad5716b70b26a23aa820.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString fa2e957273059aeebb840921dbbc8857115eeb0277dfad5716b70b26a23aa820.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa2e957273059aeebb840921dbbc8857115eeb0277dfad5716b70b26a23aa820.exe"C:\Users\Admin\AppData\Local\Temp\fa2e957273059aeebb840921dbbc8857115eeb0277dfad5716b70b26a23aa820.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD52f18930b5b2db991f7850bd83bbad4bf
SHA154889cef2a7db61a7e605ceeef4d9f6f18a0a296
SHA256af2ade9cfaeae150ca3cf383af3967b5b41216e22b1dddab93d70f806b0faa6d
SHA512c1289bd6969feb4f8dd33deb7a85d2302a9f4293cb8de0d496e6c15349e5ab98cda1c78ccef73d398b042200970aabb34657263741de1085fe0ed72ebb4346de
-
Filesize
1.1MB
MD59ba5436eb24dc273a501d6ea30c10f89
SHA1b34d92401d936fc3be32f721093a176788e09819
SHA256bf5783648f26c62688319c4204279caf561f14d3a39090e9f61fc8797ae7ae5b
SHA5125d5a9b11b89330d79a7656fc15d162ebf0244394da4f79f6260d07cb13c07495665e95f93c94344d0dfc4d2078b630a0b951b2652750e0724ee37f288f74b79a
-
Filesize
1KB
MD5664fe9ae30e3f00c5e772e196d409dc1
SHA1321a83006f55fd13df585f5a81b076466e829766
SHA25681b2acb1a0950bf976018ed47f0100a35cdddfcbfc5fd5888ddb579629524105
SHA512a496a6378990b76a6c6b14a89534117e962ae2c75792b3052089e264314ce331d1801cf66ccf04974f877b62f0ef80a38585196feed8c4b55dfa7b6e4e8cbff8
-
Filesize
1KB
MD53a1741218130828f7f0981d7adec8ee6
SHA1d04d15168563b5a053ec618b80e6ad7c317e1bb8
SHA256f5a0580f77fdbfaf91bee2a472c06b8b99f938c026bef5c78dc9af2cf1951a43
SHA5124efd19eed526b8a8c54caaeee0c798f1d2cf569dfb67323a5003a34257954cd7664fbc797f499bfa0298813bfa5abf7471822ec304fe0590004d5f94b1b4cc49
-
Filesize
7KB
MD548c90d264300101926ca98471d457e0d
SHA148313316e18220b60deb885f0b7231185d750550
SHA25612b18314b147b66e2ac180b1220f7222bc49b756c67a733efb7568f82abeb7be
SHA512cac440716aa68264c47d77a132ff00b1def7602e2e970babbd2f29e4cce661a80b573578c3e3596b2c467821205ad106cb68d371f27f1f4651664ff605d959c6
-
Filesize
54KB
MD5167617287cc418516f836079adffdb03
SHA179c39db777f5e5528b229eb5d3b241b72aeacc5a
SHA256579b87ee3df2daacb8de680e1e1d313e798cb543ae7b503184802022cd9baffe
SHA51296fcb6b421a3678dc48f3be354dd52975da5e0f993c355fa9fb0b8bd1ea57461df12413f5339fefa8c602d534c292851267fdb72b0e9d54eae12de471740e138