Analysis

  • max time kernel
    122s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2024 16:59

General

  • Target

    Crypto Ripper + reFUD pack/Crypto Obfuscator For .Net 2013/CryptoObfuscator.exe

  • Size

    8.2MB

  • MD5

    40685b8b533fdf3a2f5f14645e402cf4

  • SHA1

    b375c9244ad48e6cf16a9c192efe6493d2fc54ff

  • SHA256

    022873192bac963ae24e25c63e04b3255f8b6fe38954579ec9825e80281236c6

  • SHA512

    62da313ee13f738076cad1c38207927f7353994d595d64d8ce10aea5c717a35f8e3badce8801634642f80be2ae2e8fc6b11142aac67b6ff24cf8b414e3cbaaa8

  • SSDEEP

    196608:tRfDUvCtuFwVgaTEPRHNRtNcAFAPdMCId/7kBHg1sZwOau0XC7wyViSuCUy9hWhm:tRfAatuF2dE/dcaAPdTId/WssZ2o3ViK

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Loads dropped DLL 1 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Crypto Ripper + reFUD pack\Crypto Obfuscator For .Net 2013\CryptoObfuscator.exe
    "C:\Users\Admin\AppData\Local\Temp\Crypto Ripper + reFUD pack\Crypto Obfuscator For .Net 2013\CryptoObfuscator.exe"
    1⤵
    • Loads dropped DLL
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:2296

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\SkinSoft\VisualStyler\2.4.0.0\x64\ssapihook.dll

    Filesize

    67KB

    MD5

    8b003c3f98f8d08968ac5d3c1cc90a60

    SHA1

    68f8d418638a81839a2ad665909916cda8efe625

    SHA256

    d52a9c53f510237a194211aa3dc7d0f22f80fcc0593d9d77e0827ba6681b47e9

    SHA512

    429e97c74b8e45a43d09618972f04ba46a8075867a631543eb7b7cbbb55a719cbe2e0412f3b63b989741e3807d733b2a6f3ecb735278adc5e734e18e297c4015

  • memory/2296-19-0x000000001C6C0000-0x000000001C6C1000-memory.dmp

    Filesize

    4KB

  • memory/2296-33-0x000007FEF5880000-0x000007FEF621D000-memory.dmp

    Filesize

    9.6MB

  • memory/2296-3-0x000007FEF5880000-0x000007FEF621D000-memory.dmp

    Filesize

    9.6MB

  • memory/2296-4-0x000000001BBE0000-0x000000001BCE2000-memory.dmp

    Filesize

    1.0MB

  • memory/2296-5-0x000007FEF5880000-0x000007FEF621D000-memory.dmp

    Filesize

    9.6MB

  • memory/2296-6-0x000000001BCE0000-0x000000001BD0E000-memory.dmp

    Filesize

    184KB

  • memory/2296-20-0x000000001C6D0000-0x000000001C6D1000-memory.dmp

    Filesize

    4KB

  • memory/2296-8-0x000007FEF5880000-0x000007FEF621D000-memory.dmp

    Filesize

    9.6MB

  • memory/2296-9-0x000007FEF5880000-0x000007FEF621D000-memory.dmp

    Filesize

    9.6MB

  • memory/2296-14-0x0000000002960000-0x0000000002961000-memory.dmp

    Filesize

    4KB

  • memory/2296-1-0x000000001B900000-0x000000001B9E0000-memory.dmp

    Filesize

    896KB

  • memory/2296-15-0x0000000002A30000-0x0000000002A31000-memory.dmp

    Filesize

    4KB

  • memory/2296-16-0x000000001B690000-0x000000001B691000-memory.dmp

    Filesize

    4KB

  • memory/2296-17-0x000000001BDE0000-0x000000001BDE1000-memory.dmp

    Filesize

    4KB

  • memory/2296-35-0x000007FEF5880000-0x000007FEF621D000-memory.dmp

    Filesize

    9.6MB

  • memory/2296-2-0x000007FEF5880000-0x000007FEF621D000-memory.dmp

    Filesize

    9.6MB

  • memory/2296-7-0x000000001B620000-0x000000001B628000-memory.dmp

    Filesize

    32KB

  • memory/2296-21-0x000000001CFA0000-0x000000001CFA1000-memory.dmp

    Filesize

    4KB

  • memory/2296-22-0x000000001CFB0000-0x000000001CFB1000-memory.dmp

    Filesize

    4KB

  • memory/2296-23-0x000000001D8C0000-0x000000001D8C1000-memory.dmp

    Filesize

    4KB

  • memory/2296-25-0x000000001D8E0000-0x000000001D8E1000-memory.dmp

    Filesize

    4KB

  • memory/2296-24-0x000000001D8D0000-0x000000001D8D1000-memory.dmp

    Filesize

    4KB

  • memory/2296-26-0x000000001D8F0000-0x000000001D8F1000-memory.dmp

    Filesize

    4KB

  • memory/2296-27-0x000007FE7B900000-0x000007FE7B901000-memory.dmp

    Filesize

    4KB

  • memory/2296-28-0x000007FE7B930000-0x000007FE7B931000-memory.dmp

    Filesize

    4KB

  • memory/2296-29-0x000007FE7B910000-0x000007FE7B911000-memory.dmp

    Filesize

    4KB

  • memory/2296-30-0x000007FE7B940000-0x000007FE7B941000-memory.dmp

    Filesize

    4KB

  • memory/2296-31-0x000007FEF5880000-0x000007FEF621D000-memory.dmp

    Filesize

    9.6MB

  • memory/2296-32-0x000007FEF5B3E000-0x000007FEF5B3F000-memory.dmp

    Filesize

    4KB

  • memory/2296-0-0x000007FEF5B3E000-0x000007FEF5B3F000-memory.dmp

    Filesize

    4KB

  • memory/2296-34-0x000007FEF5880000-0x000007FEF621D000-memory.dmp

    Filesize

    9.6MB

  • memory/2296-18-0x000000001BDF0000-0x000000001BDF1000-memory.dmp

    Filesize

    4KB