Analysis

  • max time kernel
    93s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-12-2024 01:41

General

  • Target

    setup_x86_x64_install (1).exe

  • Size

    1.8MB

  • MD5

    961ed865e49001eab634e7f1d49d4865

  • SHA1

    ac28f77d1b75703518ebf6df8cdafa77da9a08aa

  • SHA256

    00bea63783ba58ffe8a63b70aa5c4c019491bed0a92ed17148836409ab7e5cc1

  • SHA512

    8d13430e0fd68959239475082822a11e681f3923471ba0cbb7bf906da86fc940b19a1e81e2a1494deee5b6fe08da8bc6ab715dcd08edb5a4f9755e39a4bbdd4a

  • SSDEEP

    24576:L3hOb1cU1l+aHBs8D3tCXG5IfsvYAPzTvW/SWlWIPqz0beYU2Z5gsUtR/VUTUb3/:LxOpmX70uDMQDU/FVUTURHinXuaa

Malware Config

Signatures

  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • CryptBot payload 3 IoCs
  • Cryptbot family
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install (1).exe
    "C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install (1).exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3028
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c cmd < Sommesso.ppt
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2416
      • C:\Windows\SysWOW64\cmd.exe
        cmd
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4824
        • C:\Windows\SysWOW64\findstr.exe
          findstr /V /R "^ZOQsXtAtHxdyuhsSoVBajbWjbeoOEYrTNLMLtwdlZxVnlJckSKVqpClCSEUVWLmIsbsxAFNuFdaSBbwNGXVTeeJkApTAicggUhuNawKhWPcSpaw$" Apparenze.ppt
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2864
        • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Pensieroso.exe.com
          Pensieroso.exe.com N
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4340
          • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Pensieroso.exe.com
            C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Pensieroso.exe.com N
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Checks processor information in registry
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:4872
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\DoRlUbXdN & timeout 3 & del /f /q "C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Pensieroso.exe.com"
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:3040
              • C:\Windows\SysWOW64\timeout.exe
                timeout 3
                7⤵
                • System Location Discovery: System Language Discovery
                • Delays execution with timeout.exe
                PID:1176
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 30
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:1716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Apparenze.ppt

    Filesize

    872KB

    MD5

    2caf8e89e6a05bb30057c7c470fdf260

    SHA1

    edb048d2d92046e97b2f991e9dbec16247ee5d8c

    SHA256

    492fcd3db49355cefd9c23e78d0a3c3082037f4d2e6ccaff65c81273255a22e8

    SHA512

    4f0e0f11c989f4030c77e274e919cb10a4b93283591d2e79f8ff4d3d44c0384dead702804abe221b54b32c8eeaa6be845e0d59cac336f6cf9256c95ae3469f3a

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Ingranditi.ppt

    Filesize

    663KB

    MD5

    9fef53ec7afd145869f53138338e189f

    SHA1

    17d26e52ca0cb3de7083b5737f7b2a84a483b462

    SHA256

    e2cce7b050bc38ea22285645f3953ea3f9ea7dab11b94da0612ebace7f59eb09

    SHA512

    b434b0839269cdc32edb0aa94b570de2e19761feb0460be7fbbc5ef2250adc09ab138c1a0ab591b89dee06957c3559dbc69af156fa560c30c19d1509be8bbaa4

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Isola.ppt

    Filesize

    894KB

    MD5

    0d1cb8e6cc1623b8a86ecabd84613e0e

    SHA1

    353b60c29f0fb219f6b1f49b112038912ec040c8

    SHA256

    05ebdcbe3983b1f87e69ffcdab45a2692e0248bb6beccbaeebacad4fb1d72bc4

    SHA512

    0af070ec9d3dcac2103f6d259b3d847303c0c14d245f3f6d8a86f81f233fad3048632c8cf43f93d3f53dca974a0ff0a61732686471a24df5d391c025757eda38

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Pensieroso.exe.com

    Filesize

    872KB

    MD5

    c56b5f0201a3b3de53e561fe76912bfd

    SHA1

    2a4062e10a5de813f5688221dbeb3f3ff33eb417

    SHA256

    237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

    SHA512

    195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

  • C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Sommesso.ppt

    Filesize

    325B

    MD5

    1b4d94eb8f5923f889afcbe5caddd449

    SHA1

    c613c7cfe6db911b07760a7767492de829cd37e7

    SHA256

    812f3d792ef7a99472b2aff8ee37c09218aed327036292cea950f27981071885

    SHA512

    6b4f3b1c3afc5acc8252746ea02eb59f1dd5d314439ea86097f3c0144aa13f2b955c77aa1d980a93f2e342393258d3943f14ca7708f303195b66f1fb5cd24c88

  • C:\Users\Admin\AppData\Local\Temp\DoRlUbXdN\IXGMSR~1.ZIP

    Filesize

    42KB

    MD5

    2f0a1e7aea7715ddae36e48d30947e0e

    SHA1

    cfa43c335999a2a7cd32e6a3df8debdab5df0ad6

    SHA256

    9e3fbcec3c91a98649cfab2c0bd094f75fc7fce0ea6fcf586983f578588afb36

    SHA512

    b136c233098591e014b3c02fd023e677d1cab563f2371458d6ce276b645bd5abdde998dd47eaeb09aa1a7656355e41778b93230fe5cb5cc42d7ed473cbd5e881

  • C:\Users\Admin\AppData\Local\Temp\DoRlUbXdN\KFLHJS~1.ZIP

    Filesize

    42KB

    MD5

    88477c0a5a008f5ba7ddd2fdff0207ba

    SHA1

    3356d1a59f5d2d123c11179e1b8a2aae7326aff6

    SHA256

    9b501ac5d8faa1715a51a9f5d2ac5d222413173ecb164e5c97489449f2fd4a38

    SHA512

    db53b44532c862a35df7335a2c6b912ccb95c57b5e6b4a34cdf5c4ed4cf85b4b7974bf53af43e56fdf73f1f55cdb0d264c60f0b4f1b6fdd8aafacc6b44ae380b

  • C:\Users\Admin\AppData\Local\Temp\DoRlUbXdN\_Files\_INFOR~1.TXT

    Filesize

    7KB

    MD5

    84dc4b034764db2ca0aa0436ee865820

    SHA1

    f2e81011f5c0590aca889c8abcde2314524c0f9b

    SHA256

    c0b77adbbc5b8ff3cc7b34b2bd8ec2f2d786d9150f5a2a502201588a42a7c08a

    SHA512

    c984449ae35d3437da60b006639be0f03372ae1b22a8191f43ab38ca535678aab4f6416e1023473666c3502521e16ee402354141c7172ea38bcd2f0fff7d0597

  • C:\Users\Admin\AppData\Local\Temp\DoRlUbXdN\_Files\_Information.txt

    Filesize

    1KB

    MD5

    c15a9d10c20192a7c22a60c3fedcf522

    SHA1

    aaa529a85335d9f6558ab026e6e7aa3d1349e622

    SHA256

    d8c617887e2a1c5917b67d46019930664f35f5b03ade0d92e06d792d74b9004a

    SHA512

    7705f3d250078f493f8bfe286b8d607ba2daf84340429a5eeb6d04ce054ccb94558c6c1d332c449b5c6ead403d594f8a1d6466ada1e6f06417cdc41457af1f13

  • C:\Users\Admin\AppData\Local\Temp\DoRlUbXdN\_Files\_Information.txt

    Filesize

    3KB

    MD5

    865ded9dede15011ae3255b99803f96d

    SHA1

    d98d93a762747c707e395356f58bb286fd9c5435

    SHA256

    8451134d7521d4d99a16d82d05f6642701e14b892c41aad6271d3e0af7102322

    SHA512

    f361de8d4d081eae03ccee892070b766c58ca392da12b9e429b87d1e057ca37dab12dbe362ecaf451cfc5ea13f2d6d6c0a431a9f8d7037081b186f19dbe873a7

  • C:\Users\Admin\AppData\Local\Temp\DoRlUbXdN\_Files\_Information.txt

    Filesize

    4KB

    MD5

    bbb115a3e4968dd7b8a9d595b7fb5526

    SHA1

    8f7d721d4d3ed7bcc5208275c0438ff74984856b

    SHA256

    61dc2f242a3957b0434f04a420d6ae20262b08bb4c5ed1dc297d32c0d8329654

    SHA512

    47932447c1061803d4988b64b91fee4c9a441bef8650a20b690f181a7670674fc76de81716372ef2e14bb59c34d617cf0b0c1e9a5301a7d33f0e5d1603a879b7

  • C:\Users\Admin\AppData\Local\Temp\DoRlUbXdN\_Files\_Screen_Desktop.jpeg

    Filesize

    47KB

    MD5

    aa08f1e25c20320034591a6be1d4f7c2

    SHA1

    a90561042ffa332235893c361346e133dedee00d

    SHA256

    34c926d9bd078e7d4d351d27a9157a823cf7be53d4a8d68b9ea415f89a426563

    SHA512

    46c7efbf26719477d658c9633aff58b81612b344e7e29aad2c501036e5f47de390ae7c31b0b6eec7eabad3ab55207af908b89856f9cb522575f04718724cd4f5

  • C:\Users\Admin\AppData\Local\Temp\DoRlUbXdN\files_\system_info.txt

    Filesize

    7KB

    MD5

    10524c38063c1b25b1880909d820f20f

    SHA1

    2327b776ac0f6149326e1086329870529a85ee5e

    SHA256

    67cde39f26049b2c1a625b4d079f5dd450fb4d3089b2a91b5e4e53f35b288bbc

    SHA512

    71c7d4d91b202fbf15623fd71eb406a0171d6a90f7debc7c7698a1f276d0507210fe06dc5890d0c631d274cacd74be0d8680c9047f3cce1218df5305298fe388

  • memory/4872-26-0x0000000004810000-0x00000000048F5000-memory.dmp

    Filesize

    916KB

  • memory/4872-25-0x0000000004810000-0x00000000048F5000-memory.dmp

    Filesize

    916KB

  • memory/4872-24-0x0000000004810000-0x00000000048F5000-memory.dmp

    Filesize

    916KB

  • memory/4872-23-0x0000000004810000-0x00000000048F5000-memory.dmp

    Filesize

    916KB

  • memory/4872-22-0x0000000004810000-0x00000000048F5000-memory.dmp

    Filesize

    916KB

  • memory/4872-21-0x0000000004810000-0x00000000048F5000-memory.dmp

    Filesize

    916KB