Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    18-12-2024 19:58

General

  • Target

    43e41aec9e2c027a0316b7500f14b9d4.exe

  • Size

    4.2MB

  • MD5

    43e41aec9e2c027a0316b7500f14b9d4

  • SHA1

    599109f59debf7880dd9decfed047829241ac341

  • SHA256

    f5743915756451135c9902ae18aa3b6f3727cb2ac4444acef3f6b3daeab2982c

  • SHA512

    b8a53692dca178c97a5518317a8e3dbbce3d1535881d048530fba4f14719109b04ecd6bc6a98afaf0c67e077b49c69b87decd72c9adc7eb92245d9cb4f1867c7

  • SSDEEP

    98304:2O2iTB5COUtEiSi3k5wZCgNLc/0VZp62iDrArPZ8QmtNOaR2xd5:2OjT/Crxj0erLc/0/NCrJCt

Malware Config

Extracted

Family

cryptbot

Signatures

  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\43e41aec9e2c027a0316b7500f14b9d4.exe
    "C:\Users\Admin\AppData\Local\Temp\43e41aec9e2c027a0316b7500f14b9d4.exe"
    1⤵
    • Enumerates VirtualBox registry keys
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:1840

Network

  • flag-us
    DNS
    httpbin.org
    43e41aec9e2c027a0316b7500f14b9d4.exe
    Remote address:
    8.8.8.8:53
    Request
    httpbin.org
    IN A
    Response
    httpbin.org
    IN A
    98.85.100.80
    httpbin.org
    IN A
    34.226.108.155
  • flag-us
    DNS
    httpbin.org
    43e41aec9e2c027a0316b7500f14b9d4.exe
    Remote address:
    8.8.8.8:53
    Request
    httpbin.org
    IN AAAA
    Response
  • flag-us
    DNS
    home.fivetk5pn.top
    43e41aec9e2c027a0316b7500f14b9d4.exe
    Remote address:
    8.8.8.8:53
    Request
    home.fivetk5pn.top
    IN A
    Response
    home.fivetk5pn.top
    IN A
    185.185.71.170
  • flag-us
    DNS
    home.fivetk5pn.top
    43e41aec9e2c027a0316b7500f14b9d4.exe
    Remote address:
    8.8.8.8:53
    Request
    home.fivetk5pn.top
    IN AAAA
    Response
  • flag-ru
    POST
    http://home.fivetk5pn.top/vJNDHPUXPCEIZZjTPbLp1734325090
    43e41aec9e2c027a0316b7500f14b9d4.exe
    Remote address:
    185.185.71.170:80
    Request
    POST /vJNDHPUXPCEIZZjTPbLp1734325090 HTTP/1.1
    Host: home.fivetk5pn.top
    Accept: */*
    Content-Type: application/json
    Content-Length: 373549
    Response
    HTTP/1.1 200 OK
    server: nginx/1.22.1
    date: Wed, 18 Dec 2024 19:58:33 GMT
    content-type: text/html; charset=utf-8
    content-length: 1
  • flag-us
    DNS
    home.fivetk5pn.top
    43e41aec9e2c027a0316b7500f14b9d4.exe
    Remote address:
    8.8.8.8:53
    Request
    home.fivetk5pn.top
    IN A
    Response
  • flag-us
    DNS
    home.fivetk5pn.top
    43e41aec9e2c027a0316b7500f14b9d4.exe
    Remote address:
    8.8.8.8:53
    Request
    home.fivetk5pn.top
    IN AAAA
    Response
    home.fivetk5pn.top
    IN A
    185.185.71.170
  • flag-us
    DNS
    home.fivetk5pn.top
    43e41aec9e2c027a0316b7500f14b9d4.exe
    Remote address:
    8.8.8.8:53
    Request
    home.fivetk5pn.top
    IN A
    Response
    home.fivetk5pn.top
    IN A
    185.185.71.170
  • flag-ru
    GET
    http://home.fivetk5pn.top/vJNDHPUXPCEIZZjTPbLp1734325090?argument=0
    43e41aec9e2c027a0316b7500f14b9d4.exe
    Remote address:
    185.185.71.170:80
    Request
    GET /vJNDHPUXPCEIZZjTPbLp1734325090?argument=0 HTTP/1.1
    Host: home.fivetk5pn.top
    Accept: */*
    Response
    HTTP/1.1 404 NOT FOUND
    server: nginx/1.22.1
    date: Wed, 18 Dec 2024 19:58:35 GMT
    content-type: text/html; charset=utf-8
    content-length: 207
  • flag-us
    DNS
    home.fivetk5pn.top
    43e41aec9e2c027a0316b7500f14b9d4.exe
    Remote address:
    8.8.8.8:53
    Request
    home.fivetk5pn.top
    IN A
    Response
    home.fivetk5pn.top
    IN A
    185.185.71.170
  • flag-us
    DNS
    home.fivetk5pn.top
    43e41aec9e2c027a0316b7500f14b9d4.exe
    Remote address:
    8.8.8.8:53
    Request
    home.fivetk5pn.top
    IN AAAA
    Response
  • flag-ru
    POST
    http://home.fivetk5pn.top/vJNDHPUXPCEIZZjTPbLp1734325090
    43e41aec9e2c027a0316b7500f14b9d4.exe
    Remote address:
    185.185.71.170:80
    Request
    POST /vJNDHPUXPCEIZZjTPbLp1734325090 HTTP/1.1
    Host: home.fivetk5pn.top
    Accept: */*
    Content-Type: application/json
    Content-Length: 31
    Response
    HTTP/1.1 404 NOT FOUND
    server: nginx/1.22.1
    date: Wed, 18 Dec 2024 19:58:36 GMT
    content-type: text/html; charset=utf-8
    content-length: 207
  • 98.85.100.80:443
    httpbin.org
    tls
    43e41aec9e2c027a0316b7500f14b9d4.exe
    1.6kB
    6.5kB
    16
    15
  • 185.185.71.170:80
    http://home.fivetk5pn.top/vJNDHPUXPCEIZZjTPbLp1734325090
    http
    43e41aec9e2c027a0316b7500f14b9d4.exe
    385.0kB
    6.0kB
    281
    147

    HTTP Request

    POST http://home.fivetk5pn.top/vJNDHPUXPCEIZZjTPbLp1734325090

    HTTP Response

    200
  • 185.185.71.170:80
    http://home.fivetk5pn.top/vJNDHPUXPCEIZZjTPbLp1734325090?argument=0
    http
    43e41aec9e2c027a0316b7500f14b9d4.exe
    328 B
    525 B
    5
    4

    HTTP Request

    GET http://home.fivetk5pn.top/vJNDHPUXPCEIZZjTPbLp1734325090?argument=0

    HTTP Response

    404
  • 185.185.71.170:80
    http://home.fivetk5pn.top/vJNDHPUXPCEIZZjTPbLp1734325090
    http
    43e41aec9e2c027a0316b7500f14b9d4.exe
    401 B
    525 B
    5
    4

    HTTP Request

    POST http://home.fivetk5pn.top/vJNDHPUXPCEIZZjTPbLp1734325090

    HTTP Response

    404
  • 8.8.8.8:53
    httpbin.org
    dns
    43e41aec9e2c027a0316b7500f14b9d4.exe
    160 B
    250 B
    2
    2

    DNS Request

    httpbin.org

    DNS Request

    httpbin.org

    DNS Response

    98.85.100.80
    34.226.108.155

  • 8.8.8.8:53
    home.fivetk5pn.top
    dns
    43e41aec9e2c027a0316b7500f14b9d4.exe
    174 B
    226 B
    2
    2

    DNS Request

    home.fivetk5pn.top

    DNS Request

    home.fivetk5pn.top

    DNS Response

    185.185.71.170

  • 8.8.8.8:53
    home.fivetk5pn.top
    dns
    43e41aec9e2c027a0316b7500f14b9d4.exe
    249 B
    317 B
    3
    3

    DNS Request

    home.fivetk5pn.top

    DNS Request

    home.fivetk5pn.top

    DNS Request

    home.fivetk5pn.top

    DNS Response

    185.185.71.170

    DNS Response

    185.185.71.170

  • 8.8.8.8:53
    home.fivetk5pn.top
    dns
    43e41aec9e2c027a0316b7500f14b9d4.exe
    174 B
    226 B
    2
    2

    DNS Request

    home.fivetk5pn.top

    DNS Request

    home.fivetk5pn.top

    DNS Response

    185.185.71.170

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1840-0-0x00000000013A0000-0x0000000002012000-memory.dmp

    Filesize

    12.4MB

  • memory/1840-1-0x0000000077470000-0x0000000077472000-memory.dmp

    Filesize

    8KB

  • memory/1840-2-0x00000000013A1000-0x0000000001624000-memory.dmp

    Filesize

    2.5MB

  • memory/1840-3-0x00000000013A0000-0x0000000002012000-memory.dmp

    Filesize

    12.4MB

  • memory/1840-4-0x00000000013A0000-0x0000000002012000-memory.dmp

    Filesize

    12.4MB

  • memory/1840-5-0x00000000013A0000-0x0000000002012000-memory.dmp

    Filesize

    12.4MB

  • memory/1840-6-0x00000000013A0000-0x0000000002012000-memory.dmp

    Filesize

    12.4MB

  • memory/1840-7-0x00000000013A0000-0x0000000002012000-memory.dmp

    Filesize

    12.4MB

  • memory/1840-8-0x00000000013A0000-0x0000000002012000-memory.dmp

    Filesize

    12.4MB

  • memory/1840-9-0x00000000013A0000-0x0000000002012000-memory.dmp

    Filesize

    12.4MB

  • memory/1840-10-0x00000000013A0000-0x0000000002012000-memory.dmp

    Filesize

    12.4MB

  • memory/1840-11-0x00000000013A0000-0x0000000002012000-memory.dmp

    Filesize

    12.4MB

  • memory/1840-12-0x00000000013A0000-0x0000000002012000-memory.dmp

    Filesize

    12.4MB

  • memory/1840-13-0x00000000013A0000-0x0000000002012000-memory.dmp

    Filesize

    12.4MB

  • memory/1840-14-0x00000000013A0000-0x0000000002012000-memory.dmp

    Filesize

    12.4MB

  • memory/1840-16-0x00000000013A0000-0x0000000002012000-memory.dmp

    Filesize

    12.4MB

  • memory/1840-17-0x00000000013A0000-0x0000000002012000-memory.dmp

    Filesize

    12.4MB

  • memory/1840-18-0x00000000013A0000-0x0000000002012000-memory.dmp

    Filesize

    12.4MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.