Overview
overview
10Static
static
3setup_x86_...1).exe
windows7-x64
10setup_x86_...1).exe
windows10-2004-x64
10setup_x86_...0).exe
windows7-x64
10setup_x86_...0).exe
windows10-2004-x64
10setup_x86_...1).exe
windows7-x64
10setup_x86_...1).exe
windows10-2004-x64
10setup_x86_...2).exe
windows7-x64
10setup_x86_...2).exe
windows10-2004-x64
10setup_x86_...3).exe
windows7-x64
10setup_x86_...3).exe
windows10-2004-x64
10setup_x86_...4).exe
windows7-x64
10setup_x86_...4).exe
windows10-2004-x64
10setup_x86_...5).exe
windows7-x64
10setup_x86_...5).exe
windows10-2004-x64
10setup_x86_...6).exe
windows7-x64
10setup_x86_...6).exe
windows10-2004-x64
10setup_x86_...7).exe
windows7-x64
10setup_x86_...7).exe
windows10-2004-x64
10setup_x86_...8).exe
windows7-x64
10setup_x86_...8).exe
windows10-2004-x64
10setup_x86_...9).exe
windows7-x64
10setup_x86_...9).exe
windows10-2004-x64
10setup_x86_...2).exe
windows7-x64
10setup_x86_...2).exe
windows10-2004-x64
10setup_x86_...0).exe
windows7-x64
10setup_x86_...0).exe
windows10-2004-x64
10setup_x86_...1).exe
windows7-x64
10setup_x86_...1).exe
windows10-2004-x64
10setup_x86_...2).exe
windows7-x64
10setup_x86_...2).exe
windows10-2004-x64
10setup_x86_...3).exe
windows7-x64
10setup_x86_...3).exe
windows10-2004-x64
10Analysis
-
max time kernel
93s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2024 01:41
Static task
static1
Behavioral task
behavioral1
Sample
setup_x86_x64_install (1).exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
setup_x86_x64_install (1).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
setup_x86_x64_install (10).exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
setup_x86_x64_install (10).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
setup_x86_x64_install (11).exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
setup_x86_x64_install (11).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
setup_x86_x64_install (12).exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
setup_x86_x64_install (12).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
setup_x86_x64_install (13).exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
setup_x86_x64_install (13).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
setup_x86_x64_install (14).exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
setup_x86_x64_install (14).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
setup_x86_x64_install (15).exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
setup_x86_x64_install (15).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
setup_x86_x64_install (16).exe
Resource
win7-20241023-en
Behavioral task
behavioral16
Sample
setup_x86_x64_install (16).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
setup_x86_x64_install (17).exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
setup_x86_x64_install (17).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
setup_x86_x64_install (18).exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
setup_x86_x64_install (18).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
setup_x86_x64_install (19).exe
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
setup_x86_x64_install (19).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
setup_x86_x64_install (2).exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
setup_x86_x64_install (2).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
setup_x86_x64_install (20).exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
setup_x86_x64_install (20).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
setup_x86_x64_install (21).exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
setup_x86_x64_install (21).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
setup_x86_x64_install (22).exe
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
setup_x86_x64_install (22).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
setup_x86_x64_install (23).exe
Resource
win7-20240903-en
General
-
Target
setup_x86_x64_install (21).exe
-
Size
1.8MB
-
MD5
961ed865e49001eab634e7f1d49d4865
-
SHA1
ac28f77d1b75703518ebf6df8cdafa77da9a08aa
-
SHA256
00bea63783ba58ffe8a63b70aa5c4c019491bed0a92ed17148836409ab7e5cc1
-
SHA512
8d13430e0fd68959239475082822a11e681f3923471ba0cbb7bf906da86fc940b19a1e81e2a1494deee5b6fe08da8bc6ab715dcd08edb5a4f9755e39a4bbdd4a
-
SSDEEP
24576:L3hOb1cU1l+aHBs8D3tCXG5IfsvYAPzTvW/SWlWIPqz0beYU2Z5gsUtR/VUTUb3/:LxOpmX70uDMQDU/FVUTURHinXuaa
Malware Config
Signatures
-
CryptBot payload 3 IoCs
resource yara_rule behavioral28/memory/5064-24-0x0000000004B50000-0x0000000004C35000-memory.dmp family_cryptbot behavioral28/memory/5064-25-0x0000000004B50000-0x0000000004C35000-memory.dmp family_cryptbot behavioral28/memory/5064-26-0x0000000004B50000-0x0000000004C35000-memory.dmp family_cryptbot -
Cryptbot family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation setup_x86_x64_install (21).exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation Pensieroso.exe.com -
Executes dropped EXE 2 IoCs
pid Process 4524 Pensieroso.exe.com 5064 Pensieroso.exe.com -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pensieroso.exe.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pensieroso.exe.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup_x86_x64_install (21).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 396 PING.EXE -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Pensieroso.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Pensieroso.exe.com -
Delays execution with timeout.exe 1 IoCs
pid Process 4804 timeout.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 396 PING.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 5064 Pensieroso.exe.com 5064 Pensieroso.exe.com -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2144 1724 setup_x86_x64_install (21).exe 82 PID 1724 wrote to memory of 2144 1724 setup_x86_x64_install (21).exe 82 PID 1724 wrote to memory of 2144 1724 setup_x86_x64_install (21).exe 82 PID 2144 wrote to memory of 1652 2144 cmd.exe 84 PID 2144 wrote to memory of 1652 2144 cmd.exe 84 PID 2144 wrote to memory of 1652 2144 cmd.exe 84 PID 1652 wrote to memory of 2208 1652 cmd.exe 85 PID 1652 wrote to memory of 2208 1652 cmd.exe 85 PID 1652 wrote to memory of 2208 1652 cmd.exe 85 PID 1652 wrote to memory of 4524 1652 cmd.exe 86 PID 1652 wrote to memory of 4524 1652 cmd.exe 86 PID 1652 wrote to memory of 4524 1652 cmd.exe 86 PID 1652 wrote to memory of 396 1652 cmd.exe 87 PID 1652 wrote to memory of 396 1652 cmd.exe 87 PID 1652 wrote to memory of 396 1652 cmd.exe 87 PID 4524 wrote to memory of 5064 4524 Pensieroso.exe.com 88 PID 4524 wrote to memory of 5064 4524 Pensieroso.exe.com 88 PID 4524 wrote to memory of 5064 4524 Pensieroso.exe.com 88 PID 5064 wrote to memory of 1580 5064 Pensieroso.exe.com 98 PID 5064 wrote to memory of 1580 5064 Pensieroso.exe.com 98 PID 5064 wrote to memory of 1580 5064 Pensieroso.exe.com 98 PID 1580 wrote to memory of 4804 1580 cmd.exe 100 PID 1580 wrote to memory of 4804 1580 cmd.exe 100 PID 1580 wrote to memory of 4804 1580 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install (21).exe"C:\Users\Admin\AppData\Local\Temp\setup_x86_x64_install (21).exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Sommesso.ppt2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\cmd.execmd3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^ZOQsXtAtHxdyuhsSoVBajbWjbeoOEYrTNLMLtwdlZxVnlJckSKVqpClCSEUVWLmIsbsxAFNuFdaSBbwNGXVTeeJkApTAicggUhuNawKhWPcSpaw$" Apparenze.ppt4⤵
- System Location Discovery: System Language Discovery
PID:2208
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Pensieroso.exe.comPensieroso.exe.com N4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Pensieroso.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Pensieroso.exe.com N5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\DSoeZwUtccg & timeout 3 & del /f /q "C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Pensieroso.exe.com"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\timeout.exetimeout 37⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4804
-
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 304⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:396
-
-
-
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
872KB
MD52caf8e89e6a05bb30057c7c470fdf260
SHA1edb048d2d92046e97b2f991e9dbec16247ee5d8c
SHA256492fcd3db49355cefd9c23e78d0a3c3082037f4d2e6ccaff65c81273255a22e8
SHA5124f0e0f11c989f4030c77e274e919cb10a4b93283591d2e79f8ff4d3d44c0384dead702804abe221b54b32c8eeaa6be845e0d59cac336f6cf9256c95ae3469f3a
-
Filesize
663KB
MD59fef53ec7afd145869f53138338e189f
SHA117d26e52ca0cb3de7083b5737f7b2a84a483b462
SHA256e2cce7b050bc38ea22285645f3953ea3f9ea7dab11b94da0612ebace7f59eb09
SHA512b434b0839269cdc32edb0aa94b570de2e19761feb0460be7fbbc5ef2250adc09ab138c1a0ab591b89dee06957c3559dbc69af156fa560c30c19d1509be8bbaa4
-
Filesize
894KB
MD50d1cb8e6cc1623b8a86ecabd84613e0e
SHA1353b60c29f0fb219f6b1f49b112038912ec040c8
SHA25605ebdcbe3983b1f87e69ffcdab45a2692e0248bb6beccbaeebacad4fb1d72bc4
SHA5120af070ec9d3dcac2103f6d259b3d847303c0c14d245f3f6d8a86f81f233fad3048632c8cf43f93d3f53dca974a0ff0a61732686471a24df5d391c025757eda38
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
325B
MD51b4d94eb8f5923f889afcbe5caddd449
SHA1c613c7cfe6db911b07760a7767492de829cd37e7
SHA256812f3d792ef7a99472b2aff8ee37c09218aed327036292cea950f27981071885
SHA5126b4f3b1c3afc5acc8252746ea02eb59f1dd5d314439ea86097f3c0144aa13f2b955c77aa1d980a93f2e342393258d3943f14ca7708f303195b66f1fb5cd24c88
-
Filesize
45KB
MD51d03c010e1e6c319d4f9561247ed188b
SHA19f3e5066c6201bc8ed60c170e38c9fcb6d258f55
SHA25661662a9fc54723f74ddd567d907c3cdcd599c2bd955f87d3e745f98d84931b6e
SHA5127af9d74b58dfcca331ec0f4f12b38de8965f00b10df06fdb84b5e6cc76e2de35f9062f363f2a13525619a62ec66bb633e6a9f817fc464bf50ab26b469467a7e3
-
Filesize
45KB
MD58a94e6d10bfa2b9aefa981f820687ff2
SHA1ecbfbd77b46ea8c2be100a546463674f78e58311
SHA256d67306ea57fd2d05771f115b52c41dcd16cd135e6463a59989ca482aad3ee059
SHA512fab51399e36d7f0049e1155b511b788b909038a2d5791427d6d736bd57247a6d5aea302e0a7a0f225a972d71630368d848d021f837e96de083ca3395143d3f61
-
Filesize
7KB
MD535f21eac6b541bc2591915ed3c983abf
SHA196d3eef4ccbab1336b0eb97038209a428c57a777
SHA2567f78213936daa5712cd7c1e3f051c5e13605ef2609e11d1eead5e8bfdeee9ba3
SHA5120ab56b275e41bd396520703609c022042be227b87b3df708bebffa96313b6823ffb653b324241ca6a844d9c6b6d9cab8129807c4eb8c6de8e48a399cc0e454a5
-
Filesize
2KB
MD53e0a9479f5c6fba3e5b2231a04d340a5
SHA1db378d27e0c5561797980e502b24287016d09c3e
SHA25636fe00824e88ff8ebfd35acc6a50476322cd6d0178b30faca16d733ebed4e76b
SHA512dcadfd7769718e80b1c6d47137c8f333188d54bc7f40a2bc6c5e4a5ab672881575d3b1cf0062de82035fa97d08c5149c4a5c2814a71491de1d4bfaf67071c8a1
-
Filesize
3KB
MD56499f36d065fec5546e989be6644fe59
SHA18c73649136dcc02d4943ee317d4e62ce9ba75892
SHA256ee79884d9a98607e15faedc7be04c9313597f387647feeeade22ac80e6ba2a13
SHA512a64bac27c5660b93094726ff53d2a067e5331b3d44afee3a61681d5de3fe090c6be48938594982047f26848cb551d003ae6da425c5b0025ed498584a97cac663
-
Filesize
4KB
MD562a41e876e30b4d2adf7e9426920851d
SHA1c39f5a9f750ce1eb2d7ede9199e499f61c0ea337
SHA256b9e5c8e9caa436cd68d06e52b93cb3189e475a15ea4ba622c212beae7b07d8e5
SHA512a2c38ca5c7bc2f0ec9ede264bffeaeac087dd3c4783e2beab6ca015a9825571beab42c3d510a7e1712fba86e260148b71f07983aee5fbf1588891225aaab991b
-
Filesize
50KB
MD516db4b369e9df460465b907d59632c57
SHA1758a4321283d93e2d74962168921f1b265a5eac5
SHA256ba2a46d86f36f4cc523eac3a47f91eaad7160693050c87e234f072f8c748c44f
SHA512a96b17e399796ecb85d4f07a3bfa7d557524caff5abfb698ed7921e735b408a2a86722034bf877f81543ebe7178913b694bf7a479d8934d6046063892b7003b0
-
Filesize
706B
MD52b28b8504570241cc216c440a92316cc
SHA14f64304c34db14d9c5abd2e128793b4b5c2fd7b7
SHA2568e201219594570bfdc587727a1ed260da90efcf771ee5f620d0a6338ce5667cb
SHA512a8fcfd762d39a9f579f566790cbea31fedcbf324c29aae2a92bf48a12a778755c1c9a39d4a9a99daef1bbf80d8b327900fa08188b58cacedfc5b8cdcfdfd1803
-
Filesize
7KB
MD59f257a5f7bfc801bb7843a5606d6a4bd
SHA126aa6fb7e2567c71d127d3dfc266a20907386ec7
SHA25699128cc5951a2c13440fb8438f2340e675d6599db6b29fe1f515bf9c8dd87ac0
SHA51234c838bd73a455273086b830454af7e9885701ef7c504877962a254695cf7023464e83cf06094851929f3038fcce3bd6be72dc1b9fdcb5223dbfeaf358537250