Analysis
-
max time kernel
94s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 22:46
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7-20241023-en
General
-
Target
sample.exe
-
Size
1.7MB
-
MD5
e8ae1f3a412dd275335e8f0dc99a06f3
-
SHA1
9dd718b9536101926ae8e41be15ed1fe629d3d59
-
SHA256
6c8314cb40fe0f4bb65c307c8128332c62accce1581e1442ee7daac1d1847a85
-
SHA512
27b409331795ae4ca8bd312306c3465f96eb79c2ef3d27cf283f74d81513fa18c79b81a648143da46eb3838d29aae02654daa76c32254ee5aceb95ca1d7e6824
-
SSDEEP
49152:y2dYg2a/9AI4WJxMwmQYoiFPbfrJ8SMECXLzZtBtJ1Kvs3U:yWYg2aFASheoiZGJfJsvgU
Malware Config
Signatures
-
CryptBot payload 3 IoCs
resource yara_rule behavioral2/memory/4104-24-0x00000000044A0000-0x0000000004585000-memory.dmp family_cryptbot behavioral2/memory/4104-25-0x00000000044A0000-0x0000000004585000-memory.dmp family_cryptbot behavioral2/memory/4104-26-0x00000000044A0000-0x0000000004585000-memory.dmp family_cryptbot -
Cryptbot family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation sample.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Riaprirmi.exe.com -
Executes dropped EXE 2 IoCs
pid Process 2984 Riaprirmi.exe.com 4104 Riaprirmi.exe.com -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sample.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Riaprirmi.exe.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Riaprirmi.exe.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4608 PING.EXE -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Riaprirmi.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Riaprirmi.exe.com -
Delays execution with timeout.exe 1 IoCs
pid Process 3664 timeout.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4608 PING.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4104 Riaprirmi.exe.com 4104 Riaprirmi.exe.com -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 4956 wrote to memory of 3048 4956 sample.exe 82 PID 4956 wrote to memory of 3048 4956 sample.exe 82 PID 4956 wrote to memory of 3048 4956 sample.exe 82 PID 3048 wrote to memory of 3528 3048 cmd.exe 84 PID 3048 wrote to memory of 3528 3048 cmd.exe 84 PID 3048 wrote to memory of 3528 3048 cmd.exe 84 PID 3528 wrote to memory of 904 3528 cmd.exe 85 PID 3528 wrote to memory of 904 3528 cmd.exe 85 PID 3528 wrote to memory of 904 3528 cmd.exe 85 PID 3528 wrote to memory of 2984 3528 cmd.exe 86 PID 3528 wrote to memory of 2984 3528 cmd.exe 86 PID 3528 wrote to memory of 2984 3528 cmd.exe 86 PID 3528 wrote to memory of 4608 3528 cmd.exe 87 PID 3528 wrote to memory of 4608 3528 cmd.exe 87 PID 3528 wrote to memory of 4608 3528 cmd.exe 87 PID 2984 wrote to memory of 4104 2984 Riaprirmi.exe.com 88 PID 2984 wrote to memory of 4104 2984 Riaprirmi.exe.com 88 PID 2984 wrote to memory of 4104 2984 Riaprirmi.exe.com 88 PID 4104 wrote to memory of 2984 4104 Riaprirmi.exe.com 98 PID 4104 wrote to memory of 2984 4104 Riaprirmi.exe.com 98 PID 4104 wrote to memory of 2984 4104 Riaprirmi.exe.com 98 PID 2984 wrote to memory of 3664 2984 cmd.exe 100 PID 2984 wrote to memory of 3664 2984 cmd.exe 100 PID 2984 wrote to memory of 3664 2984 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\sample.exe"C:\Users\Admin\AppData\Local\Temp\sample.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Windows\system32\cmd < Palme.pptx2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^afFlggFLbJFsDNAfJSVgbojKkIWOZApycnsavZoodTulHqpnyHZBBqOprVZGsRLXAmVyviSKJNXDweelnbJaAHDcJifBZCQm$" Fummo.pptx4⤵
- System Location Discovery: System Language Discovery
PID:904
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Riaprirmi.exe.comRiaprirmi.exe.com X4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Riaprirmi.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Riaprirmi.exe.com X5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\cRCrZBpaj & timeout 3 & del /f /q "C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Riaprirmi.exe.com"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\timeout.exetimeout 37⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3664
-
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 304⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4608
-
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
894KB
MD5fb3eedc237bcd9e8b3dbd243fb44df97
SHA1bdacf4c39747376f597540b7a945fdf3546ca1ba
SHA2560ef6c6178b1e38494dac9cbdf93079f36eb3606fdb943b2764544a278de3d741
SHA512a3eb1da9217ce597a6c486161f93083f7179e93fb2de9d2b71e937c67910a4b503e47b4ce3f312477e8e4a3b54248f8342779ce12125e15c70ed0d41c489873a
-
Filesize
872KB
MD5eb070a58d3fa7694f2ab534c8444f14b
SHA1c5b6d3035ca3e85ea8d07977cbc87731c4bd4d86
SHA2566d7ebfa3caadf591892583ff214e4235c1493a002a9e284dfe9cdd3c73e6650e
SHA512674b99d046feaacc6abfd44ac3a349cf9b5ac47c76e15063e7d810bee038b98507a1e6a004a3b378cafb855321f5fe881b8deb6b326e59b74cb239d9320855ca
-
Filesize
568KB
MD53b8fc1dc6f3ef4273165994c6816f7d8
SHA136e1a04a69d0b65320adadf726aa505131a7d22c
SHA2560e633c60415e22a9a60316c8b7a731ceda98955db1fd8f3f664b7750fca74b44
SHA512c4f6b2276ba0e2fcded7585eba2dee6cacf267083e9661c3a653a2c1e832a54f89ca1e2254554c47418b6ea8f3f75ee7f5a812ca91b744c96fb3e87a82d27246
-
Filesize
353B
MD5143248a4649a30656e98074c8ca159a5
SHA1d6595b66a26c008df3663edda3fc107002b51796
SHA25603b9bfc6d9b9afa9dc6f6e9294f78e0750f0cc3250482356942cfe8ed7f3938d
SHA512fc9d4e521ae2d137c44a6ae31a5a822072fa0d6c4eeb9298bb4cd4f399abb29be5e0dfcc9ae4890f892d561ba17be38d4b336e4fc9b621061f559e2a00df75bb
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
45KB
MD575042279a9436481711f302c2fc330e6
SHA198a4eadd46228d4263590cd75551d534dd8af088
SHA2567c2dfd66883a36de87fca364ebea93cce4a2ecce9ca563c94754890b210b5df1
SHA512cf4df7a5fb66a8bf22ff1ce38c9abb2f8713e2fca94a93d7444efdc1402b6bab15d7c9b9e6a49c57419377862e99d2078663183c0a9940bcdddfebe5c898ff3f
-
Filesize
45KB
MD58f59927c5f49cd62438ffe3d19c7f0a4
SHA17575d322a30fe3fee53d301971ecc25028a1be01
SHA256ad40291b0b551249105ea12c7bd16ef38669bbbb2fd7924bf21f64fc10f50028
SHA512708b4910509bc7183db99a5da08bf34f93cd6782f0a144eaf3620605fe94e7d4a34359976ac133b7e78b868119d8ee979abbe82bd277ecdee622cd1dc85b3455
-
Filesize
7KB
MD53d3a30171d6955f72c411db91aee1fa8
SHA14ba41f22c3e212845f2ac384bfaa225961ebd931
SHA256e23874cc14da4cdc417c696df3aa1a617a08220960d8cfb86c9ce84f3441c391
SHA5123a344215463bd469ce6d220b104159c58b9f3b20e0451953e4bc20743c58876fb93a94b9aa19e276b243265486058f5f6f4d2739e0dd9404465b7f1261e0fdbd
-
Filesize
1KB
MD572b5435245768c67b67fdcf82387f989
SHA1a0091b7a40f7c726aa4d8852a147ef0d63a09a55
SHA2567b34eaa79aabb62b9734401846eab71bf4c0651f430a64ce350cc5116303fcee
SHA512b1267277ea2bb77d073cc2e876907caa43251c2bbd814ba07144aa88fc31f1723f939ff3644906ad5726420fc51c259ee4f475b3f29976af032b230c4170851a
-
Filesize
1KB
MD55b37c54b8fbe049bd3540ec5e53f19b8
SHA16ed4cca165ec9b8f47155f2f8742e9d266a491b6
SHA25663f54cb9314699c70de6d8db822c4ae900b482aedb519e5518f846d08f0486da
SHA5123ab8b7661d700ce5f8c38491c4da1de1ae0b430be6b150f5086decf441922387aae386a83aef0723c54bb4ce9808eb08db326cee52a6f5e3edd5ab4db12cb95f
-
Filesize
3KB
MD51b281fb6b84349c99203234348478d45
SHA1f51c4044b2aa10259d38b67f689d0a36582a989f
SHA2564a32edb8823c45d8d69884ed96177e24a18fde6262f898815c6e1abfba1d4b76
SHA51245a8ddadc97ec4075094a470c5383bec06d9fbc2f4b13f790aca0d7f708546844969e8c7b4723297d9911f6e83349e420b9af0809e68eff2abef23f3a7f4aac8
-
Filesize
5KB
MD5f72d5ed0d5ac91f277464077d28ecb43
SHA138b3a824ef87df2bd425c1569c94d6f10737ba52
SHA2561658dd2d8e1af7d2ef9e581fd1d037ba166cfb166562d49bcb1aae3bf03b4ae3
SHA512fca1c7afdc2f9643e2f2cc946c0977c17e6e78b67e3c24f81862d75845f4759801a4ecc2c21f1b6d515f8524d775d1f0f61c433fbdaf1f23776da14adca43e8f
-
Filesize
50KB
MD56493271da84ca0bc5b95141a0993c91b
SHA1e9eed00c6cbbffaa217eedb541759a151d7025c3
SHA256c019c0fa8d3dc3ade10c984ff3cf64754489d3646c268ce0c9156fbe1917d21c
SHA5129abd8bf5490d4be44d9839c195b8b39b7e41d0962ca88a61f87c74c861817ee8724f8a3ab818e25b70a4bd6f2d8f277b79b33745f852c49d5d1410512ff813f7
-
Filesize
7KB
MD505009463ff26c7d5da92a186e74ca6a4
SHA1fd82095bbc215fd2644dae9bf1d429653223e789
SHA256148321a5125d26b107bdf331a0d6ba28de0766e08ce22bfcd517fed1b6262b9b
SHA512b34f37a1a1112d32f3558368bb2a53b440f8eeb88228c5946c1eb9c23d767b771ab8100d1574479a3f4fd09fbfd91ac4051a73f57821b1ab7006a9a141a65128
-
Filesize
4KB
MD51655b79a5254f3745ba0a4f368fd2db5
SHA166fbf9069e0aed7deaaa969d41453c715349b538
SHA256fb387c4ff0f072cecc8bdb5d70eb79db1424e3d34736d19a0a726a7b7e4b5e03
SHA5122dedd43fb208c43ade8b6d08acee0954d9fade8729d661a7fd160c3c91d410bf50353d5853e9b5d6113a3c333a0bbf66a1f56e5eb03a4a3ff3f93afa82c93b4c