Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 14:17
Static task
static1
Behavioral task
behavioral1
Sample
Main-Installer.exe
Resource
win7-20240903-en
General
-
Target
Main-Installer.exe
-
Size
2.1MB
-
MD5
54ce61c4a0a44b61eb0cdfd8f2a2d9de
-
SHA1
b7768927797cc3bda4d5b049aeba68f2b3712d3c
-
SHA256
c65c74893e884b5f4109608289b4b38200d7f8eff0f04e2dc244a1bbcdb3f233
-
SHA512
50e5da3227a05c410fec148099289574196b1039007f0da687762e0fc746cb597ceaf7101df03de9b34dce92018cc440a2f19cbf56c73a469337ce65adcbdc80
-
SSDEEP
49152:Z7UA42umT5om24Ljd0bQaPa0nv63j210D2JBHPCeI:ZoT2umlon8d0bQc9/1tBHaeI
Malware Config
Signatures
-
CryptBot payload 3 IoCs
resource yara_rule behavioral1/memory/2744-27-0x0000000003B00000-0x0000000003BE5000-memory.dmp family_cryptbot behavioral1/memory/2744-28-0x0000000003B00000-0x0000000003BE5000-memory.dmp family_cryptbot behavioral1/memory/2744-29-0x0000000003B00000-0x0000000003BE5000-memory.dmp family_cryptbot -
Cryptbot family
-
Executes dropped EXE 2 IoCs
pid Process 1964 Riaprirmi.exe.com 2744 Riaprirmi.exe.com -
Loads dropped DLL 2 IoCs
pid Process 2108 cmd.exe 1964 Riaprirmi.exe.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Riaprirmi.exe.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Main-Installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Riaprirmi.exe.com -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2672 PING.EXE -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Riaprirmi.exe.com Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Riaprirmi.exe.com -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2672 PING.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 548 wrote to memory of 2320 548 Main-Installer.exe 31 PID 548 wrote to memory of 2320 548 Main-Installer.exe 31 PID 548 wrote to memory of 2320 548 Main-Installer.exe 31 PID 548 wrote to memory of 2320 548 Main-Installer.exe 31 PID 2320 wrote to memory of 2108 2320 cmd.exe 33 PID 2320 wrote to memory of 2108 2320 cmd.exe 33 PID 2320 wrote to memory of 2108 2320 cmd.exe 33 PID 2320 wrote to memory of 2108 2320 cmd.exe 33 PID 2108 wrote to memory of 3048 2108 cmd.exe 34 PID 2108 wrote to memory of 3048 2108 cmd.exe 34 PID 2108 wrote to memory of 3048 2108 cmd.exe 34 PID 2108 wrote to memory of 3048 2108 cmd.exe 34 PID 2108 wrote to memory of 1964 2108 cmd.exe 35 PID 2108 wrote to memory of 1964 2108 cmd.exe 35 PID 2108 wrote to memory of 1964 2108 cmd.exe 35 PID 2108 wrote to memory of 1964 2108 cmd.exe 35 PID 2108 wrote to memory of 2672 2108 cmd.exe 36 PID 2108 wrote to memory of 2672 2108 cmd.exe 36 PID 2108 wrote to memory of 2672 2108 cmd.exe 36 PID 2108 wrote to memory of 2672 2108 cmd.exe 36 PID 1964 wrote to memory of 2744 1964 Riaprirmi.exe.com 37 PID 1964 wrote to memory of 2744 1964 Riaprirmi.exe.com 37 PID 1964 wrote to memory of 2744 1964 Riaprirmi.exe.com 37 PID 1964 wrote to memory of 2744 1964 Riaprirmi.exe.com 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\Main-Installer.exe"C:\Users\Admin\AppData\Local\Temp\Main-Installer.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Consolato.tiff2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\cmd.execmd3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^CVYCRORZuebEyJkvJtosaPWIaoqERlLjlkgMnPrkCQCNVdgPGQimJxQNYfpIOjiWdlxUcnXTqXOBhpMeUlYwrjCPxBNo$" Lineamento.tiff4⤵
- System Location Discovery: System Language Discovery
PID:3048
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Riaprirmi.exe.comRiaprirmi.exe.com z4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Riaprirmi.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Riaprirmi.exe.com z5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2744
-
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 304⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2672
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
894KB
MD5e10283439c190db013c3e5b1f524e91b
SHA10698f42be2164626390656a360323cfff9198773
SHA256e42642ec415f7e760c51a5264f0c45f2ee97fbdbe5f359300973f0bb7f644de9
SHA51248a94dc39ae79372dcf230f56598b63ed7d41dab5d02a4eb32fcd97d4808dd1b184e18d7b125ba09456bc6dc3786e43d1747adcc314f7bae5c1667135dc80103
-
Filesize
603KB
MD587bcbfacde09406114109eb7e13402d9
SHA17e9220e1f7a0ef7dcc0adc045140a8f22f8c5116
SHA256421b0d3b2595a4b16545363d243a3ef7cc1c54cc2828d2c839d59ceaae7582b2
SHA512781275caf4fee8c6b399ae7c3ed3c66fd494dfdf7db5d234fa71bfca238dd0847a8ebaddaf47d27bc189aa9c8e90279df1cdceb3acb1bc997e272153451855ed
-
Filesize
306B
MD53b10b75b93db8ecb14b58c28de83c2bf
SHA1eb0361b53d27049a8f4d53af84bf9c6e8c490616
SHA256c93e16629655420a024d75e837adf71791200b35648b41ea91326adb19e51f1a
SHA512bd83d572947a954ca905aa0129f91167fe16ff37096791c2fcd44b30285249706bb7b89e9afa7626dbc961aeb1d183aac0a47d1adaa26f191c780b0ad1319205
-
Filesize
872KB
MD5c6a8a536c1cd7c3f9cb464cf5f5f495b
SHA1d4f344cdf59d0be87d54e953039446c8137889fb
SHA25602afb6e64292ff7caa21c9027cd5b27924ad0bc556c5db5f137a572ebf85b3a3
SHA512e3ce924cee057cfe92f32c8539d2335317ac4f70efd40680c6b09a8daa33f879f39116927e929ebb95094a943c7b583c573e826c34fd3cea313d638c519872c4
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c