Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20250207-en -
resource tags
arch:x64arch:x86image:win11-20250207-enlocale:en-usos:windows11-21h2-x64system -
submitted
08-02-2025 17:16
Static task
static1
Behavioral task
behavioral1
Sample
whites1213.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
whites1213.exe
Resource
win10ltsc2021-20250207-en
Behavioral task
behavioral3
Sample
whites1213.exe
Resource
win11-20250207-en
General
-
Target
whites1213.exe
-
Size
7.9MB
-
MD5
8398fc4aa3a5a5ab6ae7ed394b449d0a
-
SHA1
820ce4bb8eb51e31effa41e6829e84089b728760
-
SHA256
f25fab3f64bad2cd989035dd854b761fe06b97e76291bd180991d21d91ea5c22
-
SHA512
a44ff33aa8b477ee8a2bae6a3ac93da85df9a5fdf906baaa54b2513396df94b304bc626159e4d95561097bd3d112826e4254069320fc95f3fc167d9350234c61
-
SSDEEP
98304:mHZ28VaNl6GdtOjCiEj5P6pziE5Psj1ZC/bIMqiiTpYXHQtG5nuPAUV:m6ThtSpeqso4iKG5n
Malware Config
Extracted
cryptbot
http://home.twelve12vs.top/AvWHJxAVCxPehbRictmJ10
Signatures
-
Cryptbot family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF Set-up.exe -
Downloads MZ/PE file 1 IoCs
flow pid Process 14 872 Process not Found -
Executes dropped EXE 2 IoCs
pid Process 1588 LummaC2.exe 3116 Set-up.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Embeds OpenSSL 1 IoCs
Embeds OpenSSL, may be used to circumvent TLS interception.
resource yara_rule behavioral3/files/0x001c00000002ae4d-14.dat embeds_openssl -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3916 3116 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language whites1213.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LummaC2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Set-up.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4364 MicrosoftEdgeUpdate.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3116 Set-up.exe 3116 Set-up.exe 3116 Set-up.exe 3116 Set-up.exe 3116 Set-up.exe 3116 Set-up.exe 3116 Set-up.exe 3116 Set-up.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1928 wrote to memory of 1588 1928 whites1213.exe 81 PID 1928 wrote to memory of 1588 1928 whites1213.exe 81 PID 1928 wrote to memory of 1588 1928 whites1213.exe 81 PID 1928 wrote to memory of 3116 1928 whites1213.exe 82 PID 1928 wrote to memory of 3116 1928 whites1213.exe 82 PID 1928 wrote to memory of 3116 1928 whites1213.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\whites1213.exe"C:\Users\Admin\AppData\Local\Temp\whites1213.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\LummaC2.exe"C:\Users\Admin\AppData\Local\Temp\LummaC2.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1588
-
-
C:\Users\Admin\AppData\Local\Temp\Set-up.exe"C:\Users\Admin\AppData\Local\Temp\Set-up.exe"2⤵
- Enumerates VirtualBox registry keys
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3116 -s 9603⤵
- Program crash
PID:3916
-
-
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7OThDRDNBNzItRDQxMS00QTgwLUJGNjctQzJBOEVGNjhGQTFCfSIgdXNlcmlkPSJ7RjRDQjI4RjMtMUE3RC00Q0NFLTg5MjctNzdDRkI0NzFCREQ0fSIgaW5zdGFsbHNvdXJjZT0ibGltaXRlZCIgcmVxdWVzdGlkPSJ7MzgxMDFEQTItNzVGQy00NEQzLUIyQUMtM0Y1NDY0RDkzNTIyfSIgZGVkdXA9ImNyIiBkb21haW5qb2luZWQ9IjAiPjxodyBsb2dpY2FsX2NwdXM9IjIiIHBoeXNtZW1vcnk9IjQiIGRpc2tfdHlwZT0iMiIgc3NlPSIxIiBzc2UyPSIxIiBzc2UzPSIxIiBzc3NlMz0iMSIgc3NlNDE9IjEiIHNzZTQyPSIxIiBhdng9IjEiLz48b3MgcGxhdGZvcm09IndpbiIgdmVyc2lvbj0iMTAuMC4yMjAwMC40OTMiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7RSt4YkF6Nlk2c1UxMjg5YlM2cWw0VlJMYmtqZkJVR1RNSnNqckhyNDRpST0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7OEE2OUQzNDUtRDU2NC00NjNjLUFGRjEtQTY5RDlFNTMwRjk2fSIgdmVyc2lvbj0iMTIzLjAuNjMxMi4xMjMiIG5leHR2ZXJzaW9uPSIiIGxhbmc9ImVuIiBicmFuZD0iR0dMUyIgY2xpZW50PSIiIGluc3RhbGxhZ2U9IjAiIGluc3RhbGxkYXRldGltZT0iMTczODk1NzQxMiIgb29iZV9pbnN0YWxsX3RpbWU9IjEzMzgzNDMwMDQxNTY3MDAwMCI-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjIxNzk4NjIiIHN5c3RlbV91cHRpbWVfdGlja3M9IjQ4NDA4MTU5NTYiLz48L2FwcD48L3JlcXVlc3Q-1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3116 -ip 31161⤵PID:572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320KB
MD58da89b163d506be4a73b987517a1b9e4
SHA12e110cf5160c511fa3d5843e890b8e9316754f34
SHA256ea56e7f640355598346fa0b356699298314e25d809f3aa7cfce1804a3d1964e5
SHA512a85969bcda0b31caf0cec79f45bec068a498c7ac190fe17d7b7c03f88f5c91f5f6221fcc4fcb46604695d5b95e9047dfc1d2cf31207540c23e929fcca08d14f5
-
Filesize
7.6MB
MD553d48938c0ec850eb316cf433ecfc045
SHA14415a85e1376c1a8f6661a2cc9d23ec06557d176
SHA256f63f7d8db3ae8ed7448672263cf9333e8b867bdba7a30d73cf3966cfd8a8a909
SHA51221a69b5969f95e4dfd404e6c415ec502282f4e54aa73c0752a29af52bdbf603837ddab640bca47c317f391f91a5f60818d5f06662c600f5e01e43e2473408c99