Analysis
-
max time kernel
75s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 23:08
Behavioral task
behavioral1
Sample
2991d580a9894fd67ead96e52ae559f3c1692fcf6e4bae4b857734b9f4344483.exe
Resource
win7-20240903-en
General
-
Target
2991d580a9894fd67ead96e52ae559f3c1692fcf6e4bae4b857734b9f4344483.exe
-
Size
2.7MB
-
MD5
e79bd7a1ea4413bfebd391b86f54893c
-
SHA1
e965a062e9eadfb2d3121362942310cfd32f3afb
-
SHA256
2991d580a9894fd67ead96e52ae559f3c1692fcf6e4bae4b857734b9f4344483
-
SHA512
e85f61470100ee3c9d0bb80fd7d71757c6c4e41268f0ea05d392873a2aca4d3515a288baa11c33274383c17bb9b34d0d9e05d55b4959f5017a9981c00b4a1c1e
-
SSDEEP
49152:MNPPzVce7Xp9pbK3oRVZPDEb4jf/fFeIKnGQ+Z+/u4ae8aMSSKtarkgjP2jx:MNDVcebprK4RVZAqXfFeznGgahSLt2Yx
Malware Config
Extracted
cryptbot
veotdm61.top
morizu06.top
-
payload_url
http://tynpdi08.top/download.php?file=loungy.exe
Signatures
-
Cryptbot family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2991d580a9894fd67ead96e52ae559f3c1692fcf6e4bae4b857734b9f4344483.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2991d580a9894fd67ead96e52ae559f3c1692fcf6e4bae4b857734b9f4344483.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2991d580a9894fd67ead96e52ae559f3c1692fcf6e4bae4b857734b9f4344483.exe -
Deletes itself 1 IoCs
pid Process 2124 cmd.exe -
resource yara_rule behavioral1/memory/2072-0-0x0000000000B60000-0x000000000124E000-memory.dmp themida behavioral1/memory/2072-3-0x0000000000B60000-0x000000000124E000-memory.dmp themida behavioral1/memory/2072-2-0x0000000000B60000-0x000000000124E000-memory.dmp themida behavioral1/memory/2072-4-0x0000000000B60000-0x000000000124E000-memory.dmp themida behavioral1/memory/2072-5-0x0000000000B60000-0x000000000124E000-memory.dmp themida behavioral1/memory/2072-7-0x0000000000B60000-0x000000000124E000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 2991d580a9894fd67ead96e52ae559f3c1692fcf6e4bae4b857734b9f4344483.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2072 2991d580a9894fd67ead96e52ae559f3c1692fcf6e4bae4b857734b9f4344483.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2991d580a9894fd67ead96e52ae559f3c1692fcf6e4bae4b857734b9f4344483.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2991d580a9894fd67ead96e52ae559f3c1692fcf6e4bae4b857734b9f4344483.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2991d580a9894fd67ead96e52ae559f3c1692fcf6e4bae4b857734b9f4344483.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2728 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2072 2991d580a9894fd67ead96e52ae559f3c1692fcf6e4bae4b857734b9f4344483.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2124 2072 2991d580a9894fd67ead96e52ae559f3c1692fcf6e4bae4b857734b9f4344483.exe 31 PID 2072 wrote to memory of 2124 2072 2991d580a9894fd67ead96e52ae559f3c1692fcf6e4bae4b857734b9f4344483.exe 31 PID 2072 wrote to memory of 2124 2072 2991d580a9894fd67ead96e52ae559f3c1692fcf6e4bae4b857734b9f4344483.exe 31 PID 2072 wrote to memory of 2124 2072 2991d580a9894fd67ead96e52ae559f3c1692fcf6e4bae4b857734b9f4344483.exe 31 PID 2124 wrote to memory of 2728 2124 cmd.exe 33 PID 2124 wrote to memory of 2728 2124 cmd.exe 33 PID 2124 wrote to memory of 2728 2124 cmd.exe 33 PID 2124 wrote to memory of 2728 2124 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\2991d580a9894fd67ead96e52ae559f3c1692fcf6e4bae4b857734b9f4344483.exe"C:\Users\Admin\AppData\Local\Temp\2991d580a9894fd67ead96e52ae559f3c1692fcf6e4bae4b857734b9f4344483.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\gdPeIuCCx & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\2991d580a9894fd67ead96e52ae559f3c1692fcf6e4bae4b857734b9f4344483.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2728
-
-