Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 17:09
Static task
static1
Behavioral task
behavioral1
Sample
Setup_32x_64x.exe
Resource
win7-20240903-en
General
-
Target
Setup_32x_64x.exe
-
Size
785KB
-
MD5
fa388cb487e6a30efc90df8d6a54b430
-
SHA1
3707474e14ba8df589682edf4e6a1cf020ce9862
-
SHA256
17f6a6c407112e236586d078a77bef0947bdae149bf8c6e025bd9d0c479f0e3f
-
SHA512
92bee7c92a451cb1ad06a8ca1f634a7c8d4aeb340fb70129d337b8ea3797df73bdf45bcf49fc38d36a80f034a62ce25029bf639199cb3815499ac9e7c2e81c29
-
SSDEEP
12288:oU2JEwzrwsblKWWG6YDsLViPaPr5RpGJ/zs87GSu:cqGrwsbNnDsLViCPrISIu
Malware Config
Extracted
cryptbot
cipyfo25.top
morhej02.top
-
payload_url
http://sahbog02.top/download.php?file=acheta.exe
Signatures
-
Cryptbot family
-
Deletes itself 1 IoCs
pid Process 1552 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup_32x_64x.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Setup_32x_64x.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Setup_32x_64x.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2336 timeout.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2352 wrote to memory of 1552 2352 Setup_32x_64x.exe 30 PID 2352 wrote to memory of 1552 2352 Setup_32x_64x.exe 30 PID 2352 wrote to memory of 1552 2352 Setup_32x_64x.exe 30 PID 2352 wrote to memory of 1552 2352 Setup_32x_64x.exe 30 PID 2352 wrote to memory of 1552 2352 Setup_32x_64x.exe 30 PID 2352 wrote to memory of 1552 2352 Setup_32x_64x.exe 30 PID 2352 wrote to memory of 1552 2352 Setup_32x_64x.exe 30 PID 1552 wrote to memory of 2336 1552 cmd.exe 32 PID 1552 wrote to memory of 2336 1552 cmd.exe 32 PID 1552 wrote to memory of 2336 1552 cmd.exe 32 PID 1552 wrote to memory of 2336 1552 cmd.exe 32 PID 1552 wrote to memory of 2336 1552 cmd.exe 32 PID 1552 wrote to memory of 2336 1552 cmd.exe 32 PID 1552 wrote to memory of 2336 1552 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\Setup_32x_64x.exe"C:\Users\Admin\AppData\Local\Temp\Setup_32x_64x.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\TIZkEoCA & timeout 4 & del /f /q ""2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2336
-
-