Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-01-2025 22:41

General

  • Target

    7649ff6f49b4023cfa711ce129b2496ed3181698fa250a090b6f5020f2f1b3c1.exe

  • Size

    2.6MB

  • MD5

    f9cbc9565100a378067a6be83c7529d8

  • SHA1

    b4134e7c3649505c2b632a1adb3e88dfa64a81c7

  • SHA256

    7649ff6f49b4023cfa711ce129b2496ed3181698fa250a090b6f5020f2f1b3c1

  • SHA512

    a09b3d0f04c5fa22fb38b25371fd6313c19cbf26a92473f9fc9e77371130ad304747e7bb1fd5f7d84240a3af87f245deac71bd00578fe7e69dc830ad02e9ebe6

  • SSDEEP

    49152:ZsvmZzni4h3UIypuI3feG9cusZDDQKj2O5FUubdwWhRwta0q+z/mKQnCSHFLExiM:Zsum4BUIyAIPjcPVaQUufhRmaVK/RlmI

Malware Config

Extracted

Family

cryptbot

Signatures

  • CryptBot

    CryptBot is a C++ stealer distributed widely in bundle with other software.

  • Cryptbot family
  • Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Embeds OpenSSL 1 IoCs

    Embeds OpenSSL, may be used to circumvent TLS interception.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7649ff6f49b4023cfa711ce129b2496ed3181698fa250a090b6f5020f2f1b3c1.exe
    "C:\Users\Admin\AppData\Local\Temp\7649ff6f49b4023cfa711ce129b2496ed3181698fa250a090b6f5020f2f1b3c1.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4100
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x86.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x86.exe"
      2⤵
      • Enumerates VirtualBox registry keys
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4200

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\VC_redist.x86.exe

    Filesize

    7.1MB

    MD5

    a69021a8517e65237d478d367a448058

    SHA1

    57ce5806bc34b196285bc47d423b7b479d194a42

    SHA256

    146f111e03776787d4dfb2478fd08487541edcaec52e2148e8461d67a3494254

    SHA512

    2b9d5359144deeefe596fb7a7c64e2c06f0157d2a9d0ffd56eb10e24f4e17f67d034b17727ce08c2379604db0af46ccfc1f5bae5e78cd5ed8acfb15561e13b86

  • memory/4200-9-0x0000000000BB0000-0x00000000012C8000-memory.dmp

    Filesize

    7.1MB

  • memory/4200-10-0x0000000000BB0000-0x00000000012C8000-memory.dmp

    Filesize

    7.1MB

  • memory/4200-13-0x0000000000BB0000-0x00000000012C8000-memory.dmp

    Filesize

    7.1MB

  • memory/4200-23-0x0000000000BB0000-0x00000000012C8000-memory.dmp

    Filesize

    7.1MB