Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 13:14
Behavioral task
behavioral1
Sample
66e4a874645a4e5cffa45813dd5e6bc38dd218247ff784a0618a2d38bdb4a767.exe
Resource
win7-20240903-en
General
-
Target
66e4a874645a4e5cffa45813dd5e6bc38dd218247ff784a0618a2d38bdb4a767.exe
-
Size
2.7MB
-
MD5
459b0f64c3cb635a03af588adcb98077
-
SHA1
af3573b5a9ae95d061bb2c0f262a7759b6d8c309
-
SHA256
66e4a874645a4e5cffa45813dd5e6bc38dd218247ff784a0618a2d38bdb4a767
-
SHA512
17a53247ea4514c66abb01cecdc44919d768905df56eb6a15361b84c7ea07edc329f48b266406997b40e218cc28ad26b3d295eb55067aa92c3d85e4573b8457a
-
SSDEEP
49152:wrIYJCr5CDFd4A53p7o6xPsvjV3AW94ltRH8I1zRp6z7R6N:wrzCrGFd44y6xPi53AWutF7A7E
Malware Config
Extracted
cryptbot
kotbri22.top
moruzj02.top
-
payload_url
http://okavor03.top/download.php?file=acaboa.exe
Signatures
-
Cryptbot family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 66e4a874645a4e5cffa45813dd5e6bc38dd218247ff784a0618a2d38bdb4a767.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 66e4a874645a4e5cffa45813dd5e6bc38dd218247ff784a0618a2d38bdb4a767.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 66e4a874645a4e5cffa45813dd5e6bc38dd218247ff784a0618a2d38bdb4a767.exe -
Deletes itself 1 IoCs
pid Process 2236 cmd.exe -
resource yara_rule behavioral1/memory/2280-0-0x0000000000EF0000-0x00000000015E5000-memory.dmp themida behavioral1/memory/2280-2-0x0000000000EF0000-0x00000000015E5000-memory.dmp themida behavioral1/memory/2280-3-0x0000000000EF0000-0x00000000015E5000-memory.dmp themida behavioral1/memory/2280-4-0x0000000000EF0000-0x00000000015E5000-memory.dmp themida behavioral1/memory/2280-5-0x0000000000EF0000-0x00000000015E5000-memory.dmp themida behavioral1/memory/2280-6-0x0000000000EF0000-0x00000000015E5000-memory.dmp themida behavioral1/memory/2280-7-0x0000000000EF0000-0x00000000015E5000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 66e4a874645a4e5cffa45813dd5e6bc38dd218247ff784a0618a2d38bdb4a767.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2280 66e4a874645a4e5cffa45813dd5e6bc38dd218247ff784a0618a2d38bdb4a767.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66e4a874645a4e5cffa45813dd5e6bc38dd218247ff784a0618a2d38bdb4a767.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 66e4a874645a4e5cffa45813dd5e6bc38dd218247ff784a0618a2d38bdb4a767.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 66e4a874645a4e5cffa45813dd5e6bc38dd218247ff784a0618a2d38bdb4a767.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2492 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2280 66e4a874645a4e5cffa45813dd5e6bc38dd218247ff784a0618a2d38bdb4a767.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2280 wrote to memory of 2236 2280 66e4a874645a4e5cffa45813dd5e6bc38dd218247ff784a0618a2d38bdb4a767.exe 31 PID 2280 wrote to memory of 2236 2280 66e4a874645a4e5cffa45813dd5e6bc38dd218247ff784a0618a2d38bdb4a767.exe 31 PID 2280 wrote to memory of 2236 2280 66e4a874645a4e5cffa45813dd5e6bc38dd218247ff784a0618a2d38bdb4a767.exe 31 PID 2280 wrote to memory of 2236 2280 66e4a874645a4e5cffa45813dd5e6bc38dd218247ff784a0618a2d38bdb4a767.exe 31 PID 2236 wrote to memory of 2492 2236 cmd.exe 33 PID 2236 wrote to memory of 2492 2236 cmd.exe 33 PID 2236 wrote to memory of 2492 2236 cmd.exe 33 PID 2236 wrote to memory of 2492 2236 cmd.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\66e4a874645a4e5cffa45813dd5e6bc38dd218247ff784a0618a2d38bdb4a767.exe"C:\Users\Admin\AppData\Local\Temp\66e4a874645a4e5cffa45813dd5e6bc38dd218247ff784a0618a2d38bdb4a767.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\BCoLfnEdT & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\66e4a874645a4e5cffa45813dd5e6bc38dd218247ff784a0618a2d38bdb4a767.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2492
-
-