Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-01-2025 21:07
Static task
static1
Behavioral task
behavioral1
Sample
72d7f2c25d9368c8e60be5aea600336106be8ed587176c2d9be66ae059a700d0.exe
Resource
win7-20240903-en
General
-
Target
72d7f2c25d9368c8e60be5aea600336106be8ed587176c2d9be66ae059a700d0.exe
-
Size
3.2MB
-
MD5
ef95037bc2bc262ebf19f6d0e32989aa
-
SHA1
3758acfc8f32db765d3bed155293c10e9f2d563c
-
SHA256
72d7f2c25d9368c8e60be5aea600336106be8ed587176c2d9be66ae059a700d0
-
SHA512
da21c049dc5f7397c32e62b03e49c72933fe9ad16c90fb85d5dc12ad5b3e5ca08068096fb8d1befdbbfb92137cea1a852f6cdecac7ab77906d6a62b28e26631b
-
SSDEEP
49152:ZsvZqioD6MlKCXijBNt9BlXMJq7FSFG+85whW7QMt9XoayEIu3tyws:ZshoDVKCXidDDpRSFG+fhWM6CoIudBs
Malware Config
Extracted
cryptbot
Signatures
-
Cryptbot family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF VC_redist.x86.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 8080 powershell.exe -
Executes dropped EXE 3 IoCs
pid Process 2044 VC_redist.x64.exe 848 VC_redist.x86.exe 2972 TypeId.exe -
Loads dropped DLL 6 IoCs
pid Process 2012 72d7f2c25d9368c8e60be5aea600336106be8ed587176c2d9be66ae059a700d0.exe 2012 72d7f2c25d9368c8e60be5aea600336106be8ed587176c2d9be66ae059a700d0.exe 2012 72d7f2c25d9368c8e60be5aea600336106be8ed587176c2d9be66ae059a700d0.exe 2012 72d7f2c25d9368c8e60be5aea600336106be8ed587176c2d9be66ae059a700d0.exe 2012 72d7f2c25d9368c8e60be5aea600336106be8ed587176c2d9be66ae059a700d0.exe 608 taskeng.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2972 set thread context of 2800 2972 TypeId.exe 40 -
Embeds OpenSSL 1 IoCs
Embeds OpenSSL, may be used to circumvent TLS interception.
resource yara_rule behavioral1/files/0x0009000000019234-2633.dat embeds_openssl -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 72d7f2c25d9368c8e60be5aea600336106be8ed587176c2d9be66ae059a700d0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VC_redist.x86.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 8080 powershell.exe 848 VC_redist.x86.exe 848 VC_redist.x86.exe 848 VC_redist.x86.exe 848 VC_redist.x86.exe 848 VC_redist.x86.exe 2972 TypeId.exe 2972 TypeId.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe 2800 AddInUtil.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2044 VC_redist.x64.exe Token: SeDebugPrivilege 8080 powershell.exe Token: SeDebugPrivilege 2972 TypeId.exe Token: SeDebugPrivilege 2800 AddInUtil.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2012 wrote to memory of 2044 2012 72d7f2c25d9368c8e60be5aea600336106be8ed587176c2d9be66ae059a700d0.exe 30 PID 2012 wrote to memory of 2044 2012 72d7f2c25d9368c8e60be5aea600336106be8ed587176c2d9be66ae059a700d0.exe 30 PID 2012 wrote to memory of 2044 2012 72d7f2c25d9368c8e60be5aea600336106be8ed587176c2d9be66ae059a700d0.exe 30 PID 2012 wrote to memory of 2044 2012 72d7f2c25d9368c8e60be5aea600336106be8ed587176c2d9be66ae059a700d0.exe 30 PID 8048 wrote to memory of 8080 8048 taskeng.exe 35 PID 8048 wrote to memory of 8080 8048 taskeng.exe 35 PID 8048 wrote to memory of 8080 8048 taskeng.exe 35 PID 2012 wrote to memory of 848 2012 72d7f2c25d9368c8e60be5aea600336106be8ed587176c2d9be66ae059a700d0.exe 37 PID 2012 wrote to memory of 848 2012 72d7f2c25d9368c8e60be5aea600336106be8ed587176c2d9be66ae059a700d0.exe 37 PID 2012 wrote to memory of 848 2012 72d7f2c25d9368c8e60be5aea600336106be8ed587176c2d9be66ae059a700d0.exe 37 PID 2012 wrote to memory of 848 2012 72d7f2c25d9368c8e60be5aea600336106be8ed587176c2d9be66ae059a700d0.exe 37 PID 608 wrote to memory of 2972 608 taskeng.exe 39 PID 608 wrote to memory of 2972 608 taskeng.exe 39 PID 608 wrote to memory of 2972 608 taskeng.exe 39 PID 2972 wrote to memory of 2800 2972 TypeId.exe 40 PID 2972 wrote to memory of 2800 2972 TypeId.exe 40 PID 2972 wrote to memory of 2800 2972 TypeId.exe 40 PID 2972 wrote to memory of 2800 2972 TypeId.exe 40 PID 2972 wrote to memory of 2800 2972 TypeId.exe 40 PID 2972 wrote to memory of 2800 2972 TypeId.exe 40 PID 2972 wrote to memory of 2800 2972 TypeId.exe 40 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\72d7f2c25d9368c8e60be5aea600336106be8ed587176c2d9be66ae059a700d0.exe"C:\Users\Admin\AppData\Local\Temp\72d7f2c25d9368c8e60be5aea600336106be8ed587176c2d9be66ae059a700d0.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x64.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x64.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2044
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x86.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x86.exe"2⤵
- Enumerates VirtualBox registry keys
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:848
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {200EADF8-9239-4631-BF3B-0974C73D7250} S-1-5-21-3533259084-2542256011-65585152-1000:XPAJOTIY\Admin:S4U:1⤵
- Suspicious use of WriteProcessMemory
PID:8048 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc 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2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:8080
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {9165EAF2-609F-4F04-B8F8-C20B30200024} S-1-5-21-3533259084-2542256011-65585152-1000:XPAJOTIY\Admin:Interactive:[1]1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:608 -
C:\Users\Admin\AppData\Roaming\IsFixedSize\TypeId.exeC:\Users\Admin\AppData\Roaming\IsFixedSize\TypeId.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
628KB
MD5ad0b3e8f6319b7fd1ead16ffe7f5be6b
SHA102ff5714aa418cf9a17eb9c17c0f02753746eac4
SHA256f585688233737a15a893b0c8fb66f75bea8478e0fed11a9c72a28dd7d048ccdc
SHA512d62c2f4a40aeed7c433b842768065b0f39496ab58e205ac008fb583e9b0018f851258ec675c8bca8cb96ced95bd568820a4bb2e9ff06c70ba7fde7b96db8f72a
-
Filesize
7.7MB
MD5f6b28de198800179a0cedaf80a94d2bf
SHA1d4ebd56bf9f0d09763b0dc7d5744833ba0a07af3
SHA256a93027840829eabd77e96b893e7afdabf832702fb9e95b056a45809e448fec2f
SHA5121c8cb16058d19a4fdd323e5736a55e1aa8d41b3cd6af0012c764b67dcb9af2a2527ec9b8a08cefc2749cba93e6ffd7bc967497b431e02dc3ba822e42e2fd929a