Analysis

  • max time kernel
    92s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-11-2024 16:59

General

  • Target

    Crypto Ripper + reFUD pack/Crypto Obfuscator For .Net 2013/CryptoObfuscator.exe

  • Size

    8.2MB

  • MD5

    40685b8b533fdf3a2f5f14645e402cf4

  • SHA1

    b375c9244ad48e6cf16a9c192efe6493d2fc54ff

  • SHA256

    022873192bac963ae24e25c63e04b3255f8b6fe38954579ec9825e80281236c6

  • SHA512

    62da313ee13f738076cad1c38207927f7353994d595d64d8ce10aea5c717a35f8e3badce8801634642f80be2ae2e8fc6b11142aac67b6ff24cf8b414e3cbaaa8

  • SSDEEP

    196608:tRfDUvCtuFwVgaTEPRHNRtNcAFAPdMCId/7kBHg1sZwOau0XC7wyViSuCUy9hWhm:tRfAatuF2dE/dcaAPdTId/WssZ2o3ViK

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Loads dropped DLL 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Crypto Ripper + reFUD pack\Crypto Obfuscator For .Net 2013\CryptoObfuscator.exe
    "C:\Users\Admin\AppData\Local\Temp\Crypto Ripper + reFUD pack\Crypto Obfuscator For .Net 2013\CryptoObfuscator.exe"
    1⤵
    • Loads dropped DLL
    • Drops desktop.ini file(s)
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:1036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\SkinSoft\VisualStyler\2.4.0.0\x64\ssapihook.dll

    Filesize

    67KB

    MD5

    8b003c3f98f8d08968ac5d3c1cc90a60

    SHA1

    68f8d418638a81839a2ad665909916cda8efe625

    SHA256

    d52a9c53f510237a194211aa3dc7d0f22f80fcc0593d9d77e0827ba6681b47e9

    SHA512

    429e97c74b8e45a43d09618972f04ba46a8075867a631543eb7b7cbbb55a719cbe2e0412f3b63b989741e3807d733b2a6f3ecb735278adc5e734e18e297c4015

  • memory/1036-23-0x00007FFE93510000-0x00007FFE93511000-memory.dmp

    Filesize

    4KB

  • memory/1036-6-0x000000001CED0000-0x000000001D39E000-memory.dmp

    Filesize

    4.8MB

  • memory/1036-2-0x00007FFEF7020000-0x00007FFEF79C1000-memory.dmp

    Filesize

    9.6MB

  • memory/1036-0-0x00007FFEF72D5000-0x00007FFEF72D6000-memory.dmp

    Filesize

    4KB

  • memory/1036-7-0x000000001D440000-0x000000001D4DC000-memory.dmp

    Filesize

    624KB

  • memory/1036-24-0x00007FFE93520000-0x00007FFE93521000-memory.dmp

    Filesize

    4KB

  • memory/1036-9-0x00007FFEF7020000-0x00007FFEF79C1000-memory.dmp

    Filesize

    9.6MB

  • memory/1036-10-0x000000001C9A0000-0x000000001C9A8000-memory.dmp

    Filesize

    32KB

  • memory/1036-11-0x000000001D8E0000-0x000000001D90E000-memory.dmp

    Filesize

    184KB

  • memory/1036-13-0x000000001D7D0000-0x000000001D7D8000-memory.dmp

    Filesize

    32KB

  • memory/1036-12-0x00007FFEF7020000-0x00007FFEF79C1000-memory.dmp

    Filesize

    9.6MB

  • memory/1036-14-0x00007FFEF7020000-0x00007FFEF79C1000-memory.dmp

    Filesize

    9.6MB

  • memory/1036-15-0x00007FFEF7020000-0x00007FFEF79C1000-memory.dmp

    Filesize

    9.6MB

  • memory/1036-1-0x00007FFEF7020000-0x00007FFEF79C1000-memory.dmp

    Filesize

    9.6MB

  • memory/1036-20-0x00007FFE93500000-0x00007FFE93501000-memory.dmp

    Filesize

    4KB

  • memory/1036-21-0x00007FFE934F0000-0x00007FFE934F1000-memory.dmp

    Filesize

    4KB

  • memory/1036-39-0x00007FFEF7020000-0x00007FFEF79C1000-memory.dmp

    Filesize

    9.6MB

  • memory/1036-3-0x000000001C730000-0x000000001C810000-memory.dmp

    Filesize

    896KB

  • memory/1036-8-0x000000001D7E0000-0x000000001D8E2000-memory.dmp

    Filesize

    1.0MB

  • memory/1036-25-0x00007FFE93590000-0x00007FFE93591000-memory.dmp

    Filesize

    4KB

  • memory/1036-26-0x00007FFE93530000-0x00007FFE93531000-memory.dmp

    Filesize

    4KB

  • memory/1036-27-0x00007FFE93540000-0x00007FFE93541000-memory.dmp

    Filesize

    4KB

  • memory/1036-28-0x00007FFE93560000-0x00007FFE93561000-memory.dmp

    Filesize

    4KB

  • memory/1036-29-0x00007FFE93570000-0x00007FFE93571000-memory.dmp

    Filesize

    4KB

  • memory/1036-30-0x00007FFE93550000-0x00007FFE93551000-memory.dmp

    Filesize

    4KB

  • memory/1036-31-0x00007FFE93580000-0x00007FFE93581000-memory.dmp

    Filesize

    4KB

  • memory/1036-32-0x00007FFE935A0000-0x00007FFE935A1000-memory.dmp

    Filesize

    4KB

  • memory/1036-33-0x00007FFE90150000-0x00007FFE90151000-memory.dmp

    Filesize

    4KB

  • memory/1036-34-0x00007FFE901A0000-0x00007FFE901A1000-memory.dmp

    Filesize

    4KB

  • memory/1036-35-0x00007FFE90160000-0x00007FFE90161000-memory.dmp

    Filesize

    4KB

  • memory/1036-36-0x00007FFE901B0000-0x00007FFE901B1000-memory.dmp

    Filesize

    4KB

  • memory/1036-37-0x00007FFEF7020000-0x00007FFEF79C1000-memory.dmp

    Filesize

    9.6MB

  • memory/1036-38-0x00007FFEF72D5000-0x00007FFEF72D6000-memory.dmp

    Filesize

    4KB

  • memory/1036-22-0x00007FFE92820000-0x00007FFE92821000-memory.dmp

    Filesize

    4KB

  • memory/1036-40-0x00007FFEF7020000-0x00007FFEF79C1000-memory.dmp

    Filesize

    9.6MB