Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 15:39
Behavioral task
behavioral1
Sample
66e4a874645a4e5cffa45813dd5e6bc38dd218247ff784a0618a2d38bdb4a767.exe
Resource
win7-20240903-en
General
-
Target
66e4a874645a4e5cffa45813dd5e6bc38dd218247ff784a0618a2d38bdb4a767.exe
-
Size
2.7MB
-
MD5
459b0f64c3cb635a03af588adcb98077
-
SHA1
af3573b5a9ae95d061bb2c0f262a7759b6d8c309
-
SHA256
66e4a874645a4e5cffa45813dd5e6bc38dd218247ff784a0618a2d38bdb4a767
-
SHA512
17a53247ea4514c66abb01cecdc44919d768905df56eb6a15361b84c7ea07edc329f48b266406997b40e218cc28ad26b3d295eb55067aa92c3d85e4573b8457a
-
SSDEEP
49152:wrIYJCr5CDFd4A53p7o6xPsvjV3AW94ltRH8I1zRp6z7R6N:wrzCrGFd44y6xPi53AWutF7A7E
Malware Config
Extracted
cryptbot
kotbri22.top
moruzj02.top
-
payload_url
http://okavor03.top/download.php?file=acaboa.exe
Signatures
-
Cryptbot family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 66e4a874645a4e5cffa45813dd5e6bc38dd218247ff784a0618a2d38bdb4a767.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 66e4a874645a4e5cffa45813dd5e6bc38dd218247ff784a0618a2d38bdb4a767.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 66e4a874645a4e5cffa45813dd5e6bc38dd218247ff784a0618a2d38bdb4a767.exe -
Deletes itself 1 IoCs
pid Process 2988 cmd.exe -
resource yara_rule behavioral1/memory/1960-0-0x0000000000810000-0x0000000000F05000-memory.dmp themida behavioral1/memory/1960-2-0x0000000000810000-0x0000000000F05000-memory.dmp themida behavioral1/memory/1960-3-0x0000000000810000-0x0000000000F05000-memory.dmp themida behavioral1/memory/1960-4-0x0000000000810000-0x0000000000F05000-memory.dmp themida behavioral1/memory/1960-5-0x0000000000810000-0x0000000000F05000-memory.dmp themida behavioral1/memory/1960-6-0x0000000000810000-0x0000000000F05000-memory.dmp themida behavioral1/memory/1960-7-0x0000000000810000-0x0000000000F05000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 66e4a874645a4e5cffa45813dd5e6bc38dd218247ff784a0618a2d38bdb4a767.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1960 66e4a874645a4e5cffa45813dd5e6bc38dd218247ff784a0618a2d38bdb4a767.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66e4a874645a4e5cffa45813dd5e6bc38dd218247ff784a0618a2d38bdb4a767.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 66e4a874645a4e5cffa45813dd5e6bc38dd218247ff784a0618a2d38bdb4a767.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 66e4a874645a4e5cffa45813dd5e6bc38dd218247ff784a0618a2d38bdb4a767.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2848 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1960 66e4a874645a4e5cffa45813dd5e6bc38dd218247ff784a0618a2d38bdb4a767.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1960 wrote to memory of 2988 1960 66e4a874645a4e5cffa45813dd5e6bc38dd218247ff784a0618a2d38bdb4a767.exe 30 PID 1960 wrote to memory of 2988 1960 66e4a874645a4e5cffa45813dd5e6bc38dd218247ff784a0618a2d38bdb4a767.exe 30 PID 1960 wrote to memory of 2988 1960 66e4a874645a4e5cffa45813dd5e6bc38dd218247ff784a0618a2d38bdb4a767.exe 30 PID 1960 wrote to memory of 2988 1960 66e4a874645a4e5cffa45813dd5e6bc38dd218247ff784a0618a2d38bdb4a767.exe 30 PID 2988 wrote to memory of 2848 2988 cmd.exe 32 PID 2988 wrote to memory of 2848 2988 cmd.exe 32 PID 2988 wrote to memory of 2848 2988 cmd.exe 32 PID 2988 wrote to memory of 2848 2988 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\66e4a874645a4e5cffa45813dd5e6bc38dd218247ff784a0618a2d38bdb4a767.exe"C:\Users\Admin\AppData\Local\Temp\66e4a874645a4e5cffa45813dd5e6bc38dd218247ff784a0618a2d38bdb4a767.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\vTIWisFLYE & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\66e4a874645a4e5cffa45813dd5e6bc38dd218247ff784a0618a2d38bdb4a767.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2848
-
-