Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2024, 22:34 UTC

General

  • Target

    file.exe

  • Size

    2.6MB

  • MD5

    801e7993452aba2a57ecc6258323a42f

  • SHA1

    269b38bc8080210f48c7418c80950d5e510e53fe

  • SHA256

    8a5f6619791694385d6e684913ce6bb67351aa45c0f8e11e47c4856dbc57fae9

  • SHA512

    cf311410d38f2d3b821b7a48616b36a1729f1448fc8137eaa4e71ad511a0dd34460132f3512534420a436fef8c95b63ee5458d194e3295fa3824ef1f2aed10bc

  • SSDEEP

    49152:Fk/epguhlPHbm8/rJN3kXBdNvOlJ18IpzMRHWtpglbIhZOW9hCjuW5OhgIn:FCeicTm4FaxmvtYR2MlbpMhCaW4hVn

Malware Config

Extracted

Family

cryptbot

C2

kotbri22.top

moruzj02.top

Attributes
  • payload_url

    http://okavor03.top/download.php?file=acaboa.exe

Signatures

  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Themida packer 7 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2640
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\flFOWtOi & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\file.exe"
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2820
      • C:\Windows\SysWOW64\timeout.exe
        timeout 4
        3⤵
        • System Location Discovery: System Language Discovery
        • Delays execution with timeout.exe
        PID:2140

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2640-0-0x0000000000CC0000-0x00000000013A6000-memory.dmp

    Filesize

    6.9MB

  • memory/2640-1-0x0000000077470000-0x0000000077472000-memory.dmp

    Filesize

    8KB

  • memory/2640-3-0x0000000000CC0000-0x00000000013A6000-memory.dmp

    Filesize

    6.9MB

  • memory/2640-2-0x0000000000CC0000-0x00000000013A6000-memory.dmp

    Filesize

    6.9MB

  • memory/2640-4-0x0000000000CC0000-0x00000000013A6000-memory.dmp

    Filesize

    6.9MB

  • memory/2640-6-0x0000000000CC0000-0x00000000013A6000-memory.dmp

    Filesize

    6.9MB

  • memory/2640-5-0x0000000000CC0000-0x00000000013A6000-memory.dmp

    Filesize

    6.9MB

  • memory/2640-8-0x0000000000CC0000-0x00000000013A6000-memory.dmp

    Filesize

    6.9MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.