Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-12-2024 03:29

General

  • Target

    fcf09a75838f976b2a8112606dee0912e662a5727822d8e349006299c3f6093a.exe

  • Size

    4.2MB

  • MD5

    ebfe28cb77f3d1246693fa372420d022

  • SHA1

    f775bdf11301f3c1577668ae9245e1c22ab54ea6

  • SHA256

    fcf09a75838f976b2a8112606dee0912e662a5727822d8e349006299c3f6093a

  • SHA512

    dea11bcc617b17fd7bb050ef32c27f00a623f209d88df6c712d5cfc10c82141cc5ff8ec9507d0f8ec6bc8f8b675e105b1972264deab5a3fbc91c9f9b2ab80d9e

  • SSDEEP

    98304:jh5LEofZ8SpH2OOS9gqEGuqskgY07kVOURaGIqGpMu0AU:d9D7zOS9gqEGuqskgYZOURaGW

Malware Config

Extracted

Family

cryptbot

Signatures

  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fcf09a75838f976b2a8112606dee0912e662a5727822d8e349006299c3f6093a.exe
    "C:\Users\Admin\AppData\Local\Temp\fcf09a75838f976b2a8112606dee0912e662a5727822d8e349006299c3f6093a.exe"
    1⤵
    • Enumerates VirtualBox registry keys
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Identifies Wine through registry keys
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    PID:2372

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2372-0-0x0000000000980000-0x00000000014D8000-memory.dmp

    Filesize

    11.3MB

  • memory/2372-1-0x0000000077620000-0x0000000077622000-memory.dmp

    Filesize

    8KB

  • memory/2372-2-0x0000000000981000-0x0000000000C05000-memory.dmp

    Filesize

    2.5MB

  • memory/2372-3-0x0000000000980000-0x00000000014D8000-memory.dmp

    Filesize

    11.3MB

  • memory/2372-4-0x0000000000980000-0x00000000014D8000-memory.dmp

    Filesize

    11.3MB

  • memory/2372-5-0x0000000000980000-0x00000000014D8000-memory.dmp

    Filesize

    11.3MB

  • memory/2372-6-0x0000000000980000-0x00000000014D8000-memory.dmp

    Filesize

    11.3MB

  • memory/2372-7-0x0000000000980000-0x00000000014D8000-memory.dmp

    Filesize

    11.3MB

  • memory/2372-8-0x0000000000980000-0x00000000014D8000-memory.dmp

    Filesize

    11.3MB

  • memory/2372-9-0x0000000000980000-0x00000000014D8000-memory.dmp

    Filesize

    11.3MB

  • memory/2372-10-0x0000000000980000-0x00000000014D8000-memory.dmp

    Filesize

    11.3MB

  • memory/2372-11-0x0000000000980000-0x00000000014D8000-memory.dmp

    Filesize

    11.3MB

  • memory/2372-12-0x0000000000980000-0x00000000014D8000-memory.dmp

    Filesize

    11.3MB

  • memory/2372-13-0x0000000000980000-0x00000000014D8000-memory.dmp

    Filesize

    11.3MB