Overview
overview
10Static
static
10Crypto Rip...in.dll
windows7-x64
1Crypto Rip...in.dll
windows10-2004-x64
1Crypto Rip...or.chm
windows7-x64
1Crypto Rip...or.chm
windows10-2004-x64
1Crypto Rip...or.exe
windows7-x64
7Crypto Rip...or.exe
windows10-2004-x64
7Crypto Rip...ce.asp
windows7-x64
3Crypto Rip...ce.asp
windows10-2004-x64
3Crypto Rip...ce.vbs
windows7-x64
1Crypto Rip...ce.vbs
windows10-2004-x64
1Crypto Rip...My.vbs
windows7-x64
1Crypto Rip...My.vbs
windows10-2004-x64
1Crypto Rip...ce.asp
windows7-x64
3Crypto Rip...ce.asp
windows10-2004-x64
3Crypto Rip...SL.dll
windows7-x64
1Crypto Rip...SL.dll
windows10-2004-x64
1Crypto Rip...ng.dll
windows7-x64
1Crypto Rip...ng.dll
windows10-2004-x64
1Crypto Rip...ce.dll
windows7-x64
1Crypto Rip...ce.dll
windows10-2004-x64
1Crypto Rip...or.dll
windows7-x64
1Crypto Rip...or.dll
windows10-2004-x64
1Crypto Rip...ks.dll
windows7-x64
1Crypto Rip...ks.dll
windows10-2004-x64
1Crypto Rip...on.dll
windows7-x64
1Crypto Rip...on.dll
windows10-2004-x64
1Crypto Rip...Da.vbs
windows7-x64
1Crypto Rip...Da.vbs
windows10-2004-x64
1Crypto Rip...Da.vbs
windows7-x64
1Crypto Rip...Da.vbs
windows10-2004-x64
1Crypto Rip...es.vbs
windows7-x64
1Crypto Rip...es.vbs
windows10-2004-x64
1Analysis
-
max time kernel
92s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 16:59
Behavioral task
behavioral1
Sample
Crypto Ripper + reFUD pack/Crypto Obfuscator For .Net 2013/COAddin.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Crypto Ripper + reFUD pack/Crypto Obfuscator For .Net 2013/COAddin.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Crypto Ripper + reFUD pack/Crypto Obfuscator For .Net 2013/CryptoObfuscator.chm
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Crypto Ripper + reFUD pack/Crypto Obfuscator For .Net 2013/CryptoObfuscator.chm
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Crypto Ripper + reFUD pack/Crypto Obfuscator For .Net 2013/CryptoObfuscator.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Crypto Ripper + reFUD pack/Crypto Obfuscator For .Net 2013/CryptoObfuscator.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Crypto Ripper + reFUD pack/Crypto Obfuscator For .Net 2013/ExceptionReportingServiceCS/Service.asp
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Crypto Ripper + reFUD pack/Crypto Obfuscator For .Net 2013/ExceptionReportingServiceCS/Service.asp
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Crypto Ripper + reFUD pack/Crypto Obfuscator For .Net 2013/ExceptionReportingServiceVB/ExceptionReportingService.vbs
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Crypto Ripper + reFUD pack/Crypto Obfuscator For .Net 2013/ExceptionReportingServiceVB/ExceptionReportingService.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Crypto Ripper + reFUD pack/Crypto Obfuscator For .Net 2013/ExceptionReportingServiceVB/My Project/My.vbs
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Crypto Ripper + reFUD pack/Crypto Obfuscator For .Net 2013/ExceptionReportingServiceVB/My Project/My.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Crypto Ripper + reFUD pack/Crypto Obfuscator For .Net 2013/ExceptionReportingServiceVB/Service.asp
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
Crypto Ripper + reFUD pack/Crypto Obfuscator For .Net 2013/ExceptionReportingServiceVB/Service.asp
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Crypto Ripper + reFUD pack/Crypto Obfuscator For .Net 2013/LogicNP.CryptoObfuscator.ExceptionReporting.SL.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Crypto Ripper + reFUD pack/Crypto Obfuscator For .Net 2013/LogicNP.CryptoObfuscator.ExceptionReporting.SL.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Crypto Ripper + reFUD pack/Crypto Obfuscator For .Net 2013/LogicNP.CryptoObfuscator.ExceptionReporting.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Crypto Ripper + reFUD pack/Crypto Obfuscator For .Net 2013/LogicNP.CryptoObfuscator.ExceptionReporting.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Crypto Ripper + reFUD pack/Crypto Obfuscator For .Net 2013/LogicNP.CryptoObfuscator.ExceptionReportingService.dll
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
Crypto Ripper + reFUD pack/Crypto Obfuscator For .Net 2013/LogicNP.CryptoObfuscator.ExceptionReportingService.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Crypto Ripper + reFUD pack/Crypto Obfuscator For .Net 2013/LogicNP.Deobfuscator.dll
Resource
win7-20241023-en
Behavioral task
behavioral22
Sample
Crypto Ripper + reFUD pack/Crypto Obfuscator For .Net 2013/LogicNP.Deobfuscator.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Crypto Ripper + reFUD pack/Crypto Obfuscator For .Net 2013/LogicNP.NAntCryptoObfucatorTasks.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Crypto Ripper + reFUD pack/Crypto Obfuscator For .Net 2013/LogicNP.NAntCryptoObfucatorTasks.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Crypto Ripper + reFUD pack/Crypto Obfuscator For .Net 2013/MSBuildIntegration.dll
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
Crypto Ripper + reFUD pack/Crypto Obfuscator For .Net 2013/MSBuildIntegration.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Crypto Ripper + reFUD pack/Crypto Obfuscator For .Net 2013/Samples/ExceptionReporting/C#/AddCustomDa.vbs
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
Crypto Ripper + reFUD pack/Crypto Obfuscator For .Net 2013/Samples/ExceptionReporting/C#/AddCustomDa.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Crypto Ripper + reFUD pack/Crypto Obfuscator For .Net 2013/Samples/ExceptionReporting/C#/AddCustomDa.vbs
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Crypto Ripper + reFUD pack/Crypto Obfuscator For .Net 2013/Samples/ExceptionReporting/C#/AddCustomDa.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Crypto Ripper + reFUD pack/Crypto Obfuscator For .Net 2013/Samples/ExceptionReporting/C#/AttachFiles.vbs
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
Crypto Ripper + reFUD pack/Crypto Obfuscator For .Net 2013/Samples/ExceptionReporting/C#/AttachFiles.vbs
Resource
win10v2004-20241007-en
General
-
Target
Crypto Ripper + reFUD pack/Crypto Obfuscator For .Net 2013/CryptoObfuscator.exe
-
Size
8.2MB
-
MD5
40685b8b533fdf3a2f5f14645e402cf4
-
SHA1
b375c9244ad48e6cf16a9c192efe6493d2fc54ff
-
SHA256
022873192bac963ae24e25c63e04b3255f8b6fe38954579ec9825e80281236c6
-
SHA512
62da313ee13f738076cad1c38207927f7353994d595d64d8ce10aea5c717a35f8e3badce8801634642f80be2ae2e8fc6b11142aac67b6ff24cf8b414e3cbaaa8
-
SSDEEP
196608:tRfDUvCtuFwVgaTEPRHNRtNcAFAPdMCId/7kBHg1sZwOau0XC7wyViSuCUy9hWhm:tRfAatuF2dE/dcaAPdTId/WssZ2o3ViK
Malware Config
Signatures
-
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Loads dropped DLL 1 IoCs
Processes:
CryptoObfuscator.exepid Process 1036 CryptoObfuscator.exe -
Drops desktop.ini file(s) 2 IoCs
Processes:
CryptoObfuscator.exedescription ioc Process File opened for modification C:\Windows\assembly\Desktop.ini CryptoObfuscator.exe File created C:\Windows\assembly\Desktop.ini CryptoObfuscator.exe -
Drops file in Windows directory 3 IoCs
Processes:
CryptoObfuscator.exedescription ioc Process File opened for modification C:\Windows\assembly CryptoObfuscator.exe File created C:\Windows\assembly\Desktop.ini CryptoObfuscator.exe File opened for modification C:\Windows\assembly\Desktop.ini CryptoObfuscator.exe -
Modifies registry class 5 IoCs
Processes:
CryptoObfuscator.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{f125ba9c-945a-2fe0-3478-16182f324fcf3}\InProcServer32 CryptoObfuscator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID CryptoObfuscator.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{f125ba9c-945a-2fe0-3478-16182f324fcf3} CryptoObfuscator.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{f125ba9c-945a-2fe0-3478-16182f324fcf3}\InProcServer32\ = 794ddc27c93ddb010040e0fd3b374f01000000000000000000000000 CryptoObfuscator.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{f125ba9c-945a-2fe0-3478-16182f324fcf3}\InProcServer32\ = 794ddc27c93ddb019bafde27c93ddb01010000000100000000000000 CryptoObfuscator.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
Processes:
CryptoObfuscator.exepid Process 1036 CryptoObfuscator.exe 1036 CryptoObfuscator.exe 1036 CryptoObfuscator.exe 1036 CryptoObfuscator.exe 1036 CryptoObfuscator.exe 1036 CryptoObfuscator.exe 1036 CryptoObfuscator.exe 1036 CryptoObfuscator.exe 1036 CryptoObfuscator.exe 1036 CryptoObfuscator.exe 1036 CryptoObfuscator.exe 1036 CryptoObfuscator.exe 1036 CryptoObfuscator.exe 1036 CryptoObfuscator.exe 1036 CryptoObfuscator.exe 1036 CryptoObfuscator.exe 1036 CryptoObfuscator.exe 1036 CryptoObfuscator.exe 1036 CryptoObfuscator.exe 1036 CryptoObfuscator.exe 1036 CryptoObfuscator.exe 1036 CryptoObfuscator.exe 1036 CryptoObfuscator.exe 1036 CryptoObfuscator.exe 1036 CryptoObfuscator.exe 1036 CryptoObfuscator.exe 1036 CryptoObfuscator.exe 1036 CryptoObfuscator.exe 1036 CryptoObfuscator.exe 1036 CryptoObfuscator.exe 1036 CryptoObfuscator.exe 1036 CryptoObfuscator.exe 1036 CryptoObfuscator.exe 1036 CryptoObfuscator.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
CryptoObfuscator.exepid Process 1036 CryptoObfuscator.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Crypto Ripper + reFUD pack\Crypto Obfuscator For .Net 2013\CryptoObfuscator.exe"C:\Users\Admin\AppData\Local\Temp\Crypto Ripper + reFUD pack\Crypto Obfuscator For .Net 2013\CryptoObfuscator.exe"1⤵
- Loads dropped DLL
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD58b003c3f98f8d08968ac5d3c1cc90a60
SHA168f8d418638a81839a2ad665909916cda8efe625
SHA256d52a9c53f510237a194211aa3dc7d0f22f80fcc0593d9d77e0827ba6681b47e9
SHA512429e97c74b8e45a43d09618972f04ba46a8075867a631543eb7b7cbbb55a719cbe2e0412f3b63b989741e3807d733b2a6f3ecb735278adc5e734e18e297c4015