Overview
overview
10Static
static
6D02D012970...94.exe
windows7-x64
1D02D012970...94.exe
windows10-2004-x64
1DBm0yQwt.exe.ViR.exe
windows7-x64
10DBm0yQwt.exe.ViR.exe
windows10-2004-x64
10ca6ec46ee9...52.apk
android-9-x86
8ca6ec46ee9...52.apk
android-10-x64
8ca6ec46ee9...52.apk
android-11-x64
8calc.exe
windows10-2004-x64
5ccc71c83c8...B3.exe
windows7-x64
7ccc71c83c8...B3.exe
windows10-2004-x64
10ccc71c83c8...68.exe
windows7-x64
7ccc71c83c8...68.exe
windows10-2004-x64
3cd2d085998...-0.dll
windows7-x64
8cd2d085998...-0.dll
windows10-2004-x64
8cdffb7e75b...ss.exe
windows7-x64
3cdffb7e75b...ss.exe
windows10-2004-x64
3cf7382c25a...c9.exe
windows7-x64
6cf7382c25a...c9.exe
windows10-2004-x64
3cgi19-alpt...e_.exe
windows7-x64
7cgi19-alpt...e_.exe
windows10-2004-x64
7chrst.exe
windows7-x64
3chrst.exe
windows10-2004-x64
3ci05l2a.exe
windows7-x64
ci05l2a.exe
windows10-2004-x64
cl.exe
windows7-x64
7cl.exe
windows10-2004-x64
7clean.exe
windows7-x64
3clean.exe
windows10-2004-x64
3coinvault.exe
windows7-x64
9coinvault.exe
windows10-2004-x64
6com_loader.exe
windows7-x64
3com_loader.exe
windows10-2004-x64
3Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 03:41
Behavioral task
behavioral1
Sample
D02D012970AA164CAD15C757D7E52994.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
D02D012970AA164CAD15C757D7E52994.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
DBm0yQwt.exe.ViR.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
DBm0yQwt.exe.ViR.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
ca6ec46ee9435a4745fd3a03267f051dc64540dd348f127bb33e9675dadd3d52.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral6
Sample
ca6ec46ee9435a4745fd3a03267f051dc64540dd348f127bb33e9675dadd3d52.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral7
Sample
ca6ec46ee9435a4745fd3a03267f051dc64540dd348f127bb33e9675dadd3d52.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral8
Sample
calc.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
ccc71c83c8d9895ef0b375273f9f185dfac63ecd01775e2dc705afe4d48c95e2_Dumped_TDS=4F9911B3.exe
Resource
win7-20241010-en
Behavioral task
behavioral10
Sample
ccc71c83c8d9895ef0b375273f9f185dfac63ecd01775e2dc705afe4d48c95e2_Dumped_TDS=4F9911B3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
ccc71c83c8d9895ef0b375273f9f185dfac63ecd01775e2dc705afe4d48c95e2_TDS=4FAD9768.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
ccc71c83c8d9895ef0b375273f9f185dfac63ecd01775e2dc705afe4d48c95e2_TDS=4FAD9768.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
cd2d085998a289134ffaf27fbdcbc8cb_api-ms-win-system-dispex-l1-1-0.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
cd2d085998a289134ffaf27fbdcbc8cb_api-ms-win-system-dispex-l1-1-0.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
cdffb7e75b20eeae4db75c9962c17b3be980a719f7597e8b11a747d72c975a36_not_packed_maybe_useless.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
cdffb7e75b20eeae4db75c9962c17b3be980a719f7597e8b11a747d72c975a36_not_packed_maybe_useless.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe
Resource
win7-20241023-en
Behavioral task
behavioral18
Sample
cf7382c25a8bf0d904d51063ceb29fb70f630bc9.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
cgi19-alptsevs-h555.exe_.exe
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
cgi19-alptsevs-h555.exe_.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
chrst.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
chrst.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
ci05l2a.exe
Resource
win7-20241010-en
Behavioral task
behavioral24
Sample
ci05l2a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
cl.exe
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
cl.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
clean.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
clean.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
coinvault.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
coinvault.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
com_loader.exe
Resource
win7-20241023-en
Behavioral task
behavioral32
Sample
com_loader.exe
Resource
win10v2004-20241007-en
General
-
Target
coinvault.exe
-
Size
544KB
-
MD5
b3a7fc445abfba3429094542049063c2
-
SHA1
451d2a60192d5a49c13dd4aed19c15448358969d
-
SHA256
2a5333438bed6532770f7d34b72439006625a9b38fd91f7659e390530cda18fd
-
SHA512
711d5a9a0fe539dc9e12092d360b008cc469cd387606e5a76c703e98b7e71863256cea4dbabf41b69b5d6bf0a7cebc01f2acd445c8d0e3a841f8dc46bc532908
-
SSDEEP
12288:xtMW53Bkb5nG7KC/MIkf74f6Z0PvB5V/EXF:xtJ53m5G7fP+Mi
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
coinvault.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Vault = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\coinvault.exe\"" coinvault.exe -
Drops desktop.ini file(s) 2 IoCs
Processes:
coinvault.exedescription ioc process File created C:\Windows\assembly\Desktop.ini coinvault.exe File opened for modification C:\Windows\assembly\Desktop.ini coinvault.exe -
Drops file in Windows directory 3 IoCs
Processes:
coinvault.exedescription ioc process File opened for modification C:\Windows\assembly coinvault.exe File created C:\Windows\assembly\Desktop.ini coinvault.exe File opened for modification C:\Windows\assembly\Desktop.ini coinvault.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
coinvault.execsc.execvtres.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language coinvault.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
coinvault.exepid process 632 coinvault.exe 632 coinvault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
coinvault.exedescription pid process Token: SeDebugPrivilege 632 coinvault.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
coinvault.execsc.exedescription pid process target process PID 632 wrote to memory of 3868 632 coinvault.exe csc.exe PID 632 wrote to memory of 3868 632 coinvault.exe csc.exe PID 632 wrote to memory of 3868 632 coinvault.exe csc.exe PID 3868 wrote to memory of 32 3868 csc.exe cvtres.exe PID 3868 wrote to memory of 32 3868 csc.exe cvtres.exe PID 3868 wrote to memory of 32 3868 csc.exe cvtres.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\coinvault.exe"C:\Users\Admin\AppData\Local\Temp\coinvault.exe"1⤵
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\q3qxrgga.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES97EB.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC97DB.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:32
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59f6c64cd56d29d86a0cf1dcbde029679
SHA18789fc3fc44163f237c61c8b9af8bda332e89116
SHA256f399c575b2d9b1b08fd30f89b9ced328787768d49ceaf4971a141ee249a4cfcd
SHA512caf996a21f1d247ed2f0f713a34ea4ff4ca6339438d4b437aa75e2bced17fde21073b7d8d39c5f87db3fb0ed64c268ea349b76a83abf8c40af6cc72bb3021d11
-
Filesize
13KB
MD5a59c132e02c40c3f11995467c8e8386d
SHA1eb5dc316dec2419398f650e96f645d1e944a907b
SHA256f9a24eed558c3e5b00f0d9457ed434394495b35e7fa5ec7154b52e768aba3f81
SHA5122d7cd10fc6e8f27df5cb65722c30a0f7a8456db4ed9bf897605a72acb9dd64148ae7846f2fdff92df182569713f0f65f302f7f8676f971447e26ec563da3342c
-
Filesize
652B
MD5bd23cd7b17cf722ffd4b31339d1ff035
SHA10fc66a3587cd09da54d620e039c6eb0603f89c30
SHA2568ad7611315fb4d21f8ab67d64f4e56cc83f516e7319398ab0238a8790b4ac609
SHA5123d5d485dd9ab8d2639f6d6786e0606094e054e444fe0264b76024a00a6750589d2b264d840273667465af42887fe608f56d17a3d3af3aa2c759f9f9692e8aed4
-
Filesize
22KB
MD5876e1e05167f8d7cd0998c864f730338
SHA1b3a0dd03960b49d4620553e53a5194eb7483b30e
SHA25677ce602164e8a8f39684776b8528b710b032f863415334125b33cda12e7b8e2b
SHA512390fd444f4b9e47664b54c9cb6459eb81e1db6f1b63db0e1c126fe17e7049b767bbd47f21894204bd53e3490d7efc8b0a962a5cebeb90e89cabcf0f3cc31f2d8
-
Filesize
347B
MD5b30ce0623e38f22121a6b4c877136f5f
SHA11f008cb527c22208e48f8b32210aafec1801d4c6
SHA256a8697110f4545a929a1fdf5313682bbb8b8e3883e79a12eac1508d48e9a181fd
SHA5122164a656c254e4481a9c8b1cf8b27537d0865fa978a3e6b42ef88362de61209a46b5655e3747e642b26a5152f73baafd600ea77271405b6784cf39cf68d82962