Analysis

  • max time kernel
    148s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26/02/2025, 18:49

General

  • Target

    Xtreme Free Commission Bot/Xtreme Free Commission Bot.exe

  • Size

    2.1MB

  • MD5

    e652c139242bac4059bfcf8371f0870a

  • SHA1

    d7945051e975384d8d848bb433cae920f824bf4b

  • SHA256

    67d25b483962a7f6c59c55e7a62a69a553ab81e19c1deefd91f79da85fd68437

  • SHA512

    a39e851ae0afb7485464fee17cde747867fda924164d634492abdd00cd64518a628db3b01dd12789c4ffdd11b607eb3f79084331a41bf98845ce744860792503

  • SSDEEP

    49152:Kyi/XpI4/xTcpdJutQZYW2P7LNWgy4ChJS+03:KyJpvuVWQhQJS73

Malware Config

Signatures

  • CryptOne packer 1 IoCs

    Detects CryptOne packer defined in NCC blogpost.

  • Downloads MZ/PE file 11 IoCs
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 49 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 10 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Xtreme Free Commission Bot\Xtreme Free Commission Bot.exe
    "C:\Users\Admin\AppData\Local\Temp\Xtreme Free Commission Bot\Xtreme Free Commission Bot.exe"
    1⤵
    • Downloads MZ/PE file
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2104
    • C:\Users\Admin\AppData\Roaming\UBot Studio\Browser\4.1.4\UBotBrowser.exe
      "C:\Users\Admin\AppData\Roaming\UBot Studio\Browser\4.1.4\UBotBrowser.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious use of WriteProcessMemory
      PID:1016
      • C:\Users\Admin\AppData\Roaming\UBot Studio\Browser\4.1.4\UBotBrowser.exe
        "C:\Users\Admin\AppData\Roaming\UBot Studio\Browser\4.1.4\UBotBrowser.exe" --type=renderer --no-sandbox --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.7 (KHTML, like Gecko) Chrome/16.0.912.77 Safari/535.7" --enable-logging --log-level=0 --lang=en-US --awesomium-package-path="C:\Users\Admin\AppData\Roaming\UBot Studio\Browser\4.1.4" --user-data-dir=C:\Users\Admin\AppData\Local\Temp\tmp19A8.tmp --awesomium-log-path="C:\Users\Admin\AppData\Roaming\UBot Studio" --channel=1016.010CD000.848271132
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        PID:1000
      • C:\Users\Admin\AppData\Roaming\UBot Studio\Browser\4.1.4\UBotBrowser.exe
        "C:\Users\Admin\AppData\Roaming\UBot Studio\Browser\4.1.4\UBotBrowser.exe" --type=renderer --no-sandbox --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.7 (KHTML, like Gecko) Chrome/16.0.912.77 Safari/535.7" --enable-logging --log-level=0 --lang=en-US --awesomium-package-path="C:\Users\Admin\AppData\Roaming\UBot Studio\Browser\4.1.4" --user-data-dir=C:\Users\Admin\AppData\Local\Temp\tmp19A8.tmp --awesomium-log-path="C:\Users\Admin\AppData\Roaming\UBot Studio" --channel=1016.010CD780.1349823406
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        PID:1308
    • C:\Users\Admin\AppData\Roaming\UBot Studio\Browser\4.1.4\UBotBrowser.exe
      "C:\Users\Admin\AppData\Roaming\UBot Studio\Browser\4.1.4\UBotBrowser.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious use of WriteProcessMemory
      PID:1312
      • C:\Users\Admin\AppData\Roaming\UBot Studio\Browser\4.1.4\UBotBrowser.exe
        "C:\Users\Admin\AppData\Roaming\UBot Studio\Browser\4.1.4\UBotBrowser.exe" --type=renderer --no-sandbox --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.7 (KHTML, like Gecko) Chrome/16.0.912.77 Safari/535.7" --enable-logging --log-level=0 --lang=en-US --awesomium-package-path="C:\Users\Admin\AppData\Roaming\UBot Studio\Browser\4.1.4" --user-data-dir=C:\Users\Admin\AppData\Local\Temp\tmp20AB.tmp --awesomium-log-path="C:\Users\Admin\AppData\Roaming\UBot Studio" --channel=1312.010CD000.1301180539
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        PID:2972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp20AB.tmp\Default\21D3.tmp

    Filesize

    505B

    MD5

    d87a7a1d63489a10ebf78db95bcaee67

    SHA1

    2688e7885dd0703406da0a00c78bfd72823524d4

    SHA256

    aa94e2044926d4b3f71d467fbcdb4ec34f1ab91dfa3508680893085ef327fcf3

    SHA512

    7856f5417c2309c3229caf79e523389988c31e2f119a6659e0b3ee2b5c26d7f6ed7472ed396fe605ebe9f14d33f7eae41aadb818ac71b7e2102b502289360082

  • C:\Users\Admin\AppData\Local\Temp\tmp20AB.tmp\Default\4809.tmp

    Filesize

    372B

    MD5

    ad847a49582e86ddb577fa3ffdefc7bf

    SHA1

    7493583dae84579fb32c88d63479e82ed8984302

    SHA256

    c637fd008fc66d9f75f2a7311a874be2c75f72bb6c4c2de274a761d62fd17c02

    SHA512

    67e9430cb84143ddc5a0b75ba3f6abc722d6d8abd61465335cac6ff5e9b194761ed6fc9a0bc7ced473b59d9897ad5e4551e2fa4ce3dc7224f49963a16360825a

  • C:\Users\Admin\AppData\Roaming\UBot Studio\Browser\4.1.4\Awesomium.dll

    Filesize

    20.4MB

    MD5

    b86a78256b8632cde4993321b31011aa

    SHA1

    aaa03e1a11d13e2d3e66398ed171bf9f67a08cbb

    SHA256

    ffc70911b66bf551e9c72163d45313ead78ff4b2ff2f31fc2bd63377f3a111d2

    SHA512

    7552a2e276b55e19b1ea8b9363f8071ce6dfa2f557be8fec5d0ccd079d4d6463eeeb6ff49ed53a885f4c7cb6624f5391ffaaf271057e4210447508c320a6d34e

  • C:\Users\Admin\AppData\Roaming\UBot Studio\Browser\4.1.4\UBotBrowser.exe

    Filesize

    559KB

    MD5

    f4104bc888bb12cc219abc6abbafe6e9

    SHA1

    0db16dcabcf723924ec5ed006a2d9a2fecfe8b9f

    SHA256

    f88dea4eefd7c8a56c09310a996c53b30db2f243d8a9c4d5adf37cc2a3e12ce2

    SHA512

    6598f887080899bf322d9e2b5736e2de143d48551da89cc469abcb743bcedfd6659f5fd644cc5156b98f404b0f1e0e75e6524e07fecc3d98bc3e40b62b44ecc6

  • C:\Users\Admin\AppData\Roaming\UBot Studio\Browser\4.1.4\avcodec-52.dll

    Filesize

    692KB

    MD5

    cc421c5be8c8a8961d4465a454fda42d

    SHA1

    d3c41532bb702b7b422296a110e3c2c0a5e263f4

    SHA256

    5938a4d445897dec80cfec39391047eb9a8971b2c3a8f438dacb15ce68f396ea

    SHA512

    b00771f48f227c1cb6b960f607c52da60d49e282b2c6a0fd314322449f4f27ab5e8da251a2ee38341bae9b31a15619b9adba41fe8a0e658ccf562e718a8c4cd3

  • C:\Users\Admin\AppData\Roaming\UBot Studio\Browser\4.1.4\icudt42.dll

    Filesize

    10.4MB

    MD5

    1137214e8e4fbc4152a347e0d6feb076

    SHA1

    5b5a418c06896bb5556acb6fc893d9d969c70511

    SHA256

    503e0fa0a18cf2d3e30fb9ee3c6cbc8368463d5194207c2946d6113585e5fff6

    SHA512

    e24a2e68abc937191f73582dccb8f20eec857bbbebc0908747a4266df594a131f06de8764e04e97375181b3a1b4f3ef01bf8bb27fa066a7c6fe7fcc573f0fb24

  • C:\Users\Admin\AppData\Roaming\UBot Studio\Browser\4.1.4\locales\en-US.dll

    Filesize

    114KB

    MD5

    7c42bf28d1fb9c55a7402f45f2911771

    SHA1

    34e45fc59f73f46b8d364a0a06f15214ae4f2b89

    SHA256

    b7aa5e23e54b76b42d4b2062f28a452a3a4ced662d9ace9ea3d07b5f429a87cc

    SHA512

    71bc04acab9ff906fcd1bed4d8b4b6d9eb0d99ecd1613b789256d7acea5667992de02eb5a1a26ed4bc73027ab6232fcbfc68da6ae30e17a6eb1ed5046b8761b1

  • C:\Users\Admin\AppData\Roaming\UBot Studio\Browser\4.1.4\msvcp100.dll

    Filesize

    411KB

    MD5

    03e9314004f504a14a61c3d364b62f66

    SHA1

    0aa3caac24fdf9d9d4c618e2bbf0a063036cd55d

    SHA256

    a3ba6421991241bea9c8334b62c3088f8f131ab906c3cc52113945d05016a35f

    SHA512

    2fcff4439d2759d93c57d49b24f28ae89b7698e284e76ac65fe2b50bdefc23a8cc3c83891d671de4e4c0f036cef810856de79ac2b028aa89a895bf35abff8c8d

  • C:\Users\Admin\AppData\Roaming\UBot Studio\Browser\4.1.4\msvcr100.dll

    Filesize

    752KB

    MD5

    67ec459e42d3081dd8fd34356f7cafc1

    SHA1

    1738050616169d5b17b5adac3ff0370b8c642734

    SHA256

    1221a09484964a6f38af5e34ee292b9afefccb3dc6e55435fd3aaf7c235d9067

    SHA512

    9ed1c106df217e0b4e4fbd1f4275486ceba1d8a225d6c7e47b854b0b5e6158135b81be926f51db0ad5c624f9bd1d09282332cf064680dc9f7d287073b9686d33

  • C:\Users\Admin\AppData\Roaming\UBot Studio\Browser\4.1.4\opencv_core220.dll

    Filesize

    1.9MB

    MD5

    09a0279fe0c812eabb8c1567200c1c21

    SHA1

    73773edc7b7a276d599d0b53f964e0e7353ffb13

    SHA256

    b32078d8f06d201981a5bd308ef2856cee6f3a7d069aaa69ee0ba2b610124f56

    SHA512

    a0a51a444f1d61120dc0568572b5ad17dda848364e0496368b2ee63700995ad88061f54eb2f7b45c14eda66f720fee518bc367d6da04a49446836ef661eeac32

  • C:\Users\Admin\AppData\Roaming\UBot Studio\Browser\4.1.4\opencv_imgproc220.dll

    Filesize

    1.2MB

    MD5

    3a6a2076d99ec66a53aec251150a3005

    SHA1

    2377125e1f654c446b22b6afcf7801164f7e5dec

    SHA256

    492389d77e543f8762e857b50cbba036da984a242ee9ce3bf4d225a8760568d9

    SHA512

    35d62d281a70ec196a7023a769a91a614c4c4f9ff89626457033aebc8af6c4d269099b7e386ad97d7b76f1f4dfaf7b175135c6b67e727955217613d81cc289fa

  • C:\Users\Admin\AppData\Roaming\UBot Studio\Browser\4.1.4\vcomp100.dll

    Filesize

    49KB

    MD5

    631945c6518533a9fadaaa8e98f4ab5b

    SHA1

    34b856ebdda19b5ab96ed77fb5fb82a00cfe023a

    SHA256

    2011268947625670a758382e811c71b597b615f1763f8d30a5195b80da4644fc

    SHA512

    1cbbc26787aeade276b30582124b7c457f352754bddf72a709e90ea884f09cc1327ebba3087ecb3224762438f669f860c640b18b1863995955e429b3ed894372

  • C:\Users\Admin\AppData\Roaming\UBot Studio\awesomium.log

    Filesize

    1KB

    MD5

    78b572c663e9ecd9e0324974bb9283a0

    SHA1

    8860ba782247ec5a026f3672d0356c35672c6808

    SHA256

    13484033ae3733a2f7c9cf795db1d8b398e60744297b2794d30662c81bc71e36

    SHA512

    c2f9533ae118289322de212247b0ae21de21ec3828c4a84269639d1f9751432508aa89f919555ee79a9a920ed7c4816db0f8ebc96383a99d4fe8b1ae45645949

  • C:\Users\Admin\AppData\Roaming\UBot Studio\awesomium.log

    Filesize

    3KB

    MD5

    f4fb837282fa2bd1cc166c490d39d7b1

    SHA1

    9b6ea0066d8c04e799841d29187834299c06b8e6

    SHA256

    9d4723a7d9ab4e48f3023652b6c02d56949e2b3c60113fd1bc90995cd41c2074

    SHA512

    0663871bc8a503be782968e9061858e0b2511939b91f558baaa35ddc0403f62533381d6c943d208d4f730fac9c6c0107c221774eb1ec7aeee99a6b5588c25a22

  • C:\Users\Admin\AppData\Roaming\UBot Studio\browser_log.txt

    Filesize

    608B

    MD5

    4fe36eeeee4475d35f4f931b70052676

    SHA1

    264a7ff13e7fdf53e4d753171fc26edf4d60c791

    SHA256

    34aea4b2264765dedfbb00678fe18fdd2f0c94dd529bdfea29593a4fa28d7a4e

    SHA512

    0d2201a4e9820ed976c46720aae7992c5142b52fd009f6f843a96c97b94391a0fae216b7bd6fc50ef482e684d7eff1451baadce51c80b44afa33fd94b02bf197

  • \Users\Admin\AppData\Roaming\UBot Studio\Browser\4.1.4\avformat-52.dll

    Filesize

    108KB

    MD5

    5d90f884f8ad9601b618bc2d95ab9099

    SHA1

    eacdd1d4aa0484c908f47902f29ffef546aee66f

    SHA256

    f3db947ba841372248e311522ce0600e71dc9cfecab5498ab2c93d3dbdcf01c6

    SHA512

    fe2021685a36fe0fe011b787557105caf3d6d0e602c3913741ec09205dd6124a8a8cb37fcf519825762329731906201ef884fe24d4615d118ffc81497aaa1deb

  • \Users\Admin\AppData\Roaming\UBot Studio\Browser\4.1.4\avutil-50.dll

    Filesize

    67KB

    MD5

    56cfb467ae3e8ecce0ed4a7220180e5b

    SHA1

    be5b2c7db9757ffc3dc8024c9f0045e3f62ec1fb

    SHA256

    20ad8789ed8c139d0a41a442f70130508916b78a334adc8dd218a69826625296

    SHA512

    5bb429e0523cc2e30cc30c2660ebe38352108afc9dcb795dcf9dc379d13eb6d003db318af48fb4550b69e413da92a00022425aca09381e38e143703a9c49578a

  • memory/1000-192-0x0000000074830000-0x000000007492A000-memory.dmp

    Filesize

    1000KB

  • memory/1000-150-0x0000000074830000-0x000000007492A000-memory.dmp

    Filesize

    1000KB

  • memory/1000-190-0x0000000074810000-0x0000000074828000-memory.dmp

    Filesize

    96KB

  • memory/1000-191-0x00000000747F0000-0x000000007480F000-memory.dmp

    Filesize

    124KB

  • memory/1308-243-0x00000000748F0000-0x000000007490F000-memory.dmp

    Filesize

    124KB

  • memory/1308-242-0x0000000074910000-0x0000000074928000-memory.dmp

    Filesize

    96KB

  • memory/1308-203-0x0000000074730000-0x000000007482A000-memory.dmp

    Filesize

    1000KB

  • memory/2104-105-0x000000001A860000-0x000000001A880000-memory.dmp

    Filesize

    128KB

  • memory/2104-10-0x000007FEF6570000-0x000007FEF6F5C000-memory.dmp

    Filesize

    9.9MB

  • memory/2104-8-0x000007FEF6570000-0x000007FEF6F5C000-memory.dmp

    Filesize

    9.9MB

  • memory/2104-140-0x000000001C0D0000-0x000000001C104000-memory.dmp

    Filesize

    208KB

  • memory/2104-7-0x000007FEF6570000-0x000007FEF6F5C000-memory.dmp

    Filesize

    9.9MB

  • memory/2104-37-0x000007FEF6570000-0x000007FEF6F5C000-memory.dmp

    Filesize

    9.9MB

  • memory/2104-104-0x000000001B0B0000-0x000000001B10C000-memory.dmp

    Filesize

    368KB

  • memory/2104-65-0x000007FEF6570000-0x000007FEF6F5C000-memory.dmp

    Filesize

    9.9MB

  • memory/2104-6-0x0000000000460000-0x0000000000474000-memory.dmp

    Filesize

    80KB

  • memory/2104-0-0x000007FEF6573000-0x000007FEF6574000-memory.dmp

    Filesize

    4KB

  • memory/2104-9-0x000007FEF6573000-0x000007FEF6574000-memory.dmp

    Filesize

    4KB

  • memory/2104-110-0x000000001D880000-0x000000001D9B8000-memory.dmp

    Filesize

    1.2MB

  • memory/2104-4-0x0000000000460000-0x000000000046A000-memory.dmp

    Filesize

    40KB

  • memory/2104-5-0x0000000000460000-0x000000000046A000-memory.dmp

    Filesize

    40KB

  • memory/2104-3-0x00000000007C0000-0x00000000007FE000-memory.dmp

    Filesize

    248KB

  • memory/2104-2-0x000007FEF6570000-0x000007FEF6F5C000-memory.dmp

    Filesize

    9.9MB

  • memory/2104-1-0x0000000000810000-0x0000000000A1A000-memory.dmp

    Filesize

    2.0MB

  • memory/2104-11-0x0000000000460000-0x000000000046A000-memory.dmp

    Filesize

    40KB

  • memory/2972-202-0x0000000074730000-0x000000007482A000-memory.dmp

    Filesize

    1000KB

  • memory/2972-240-0x00000000748F0000-0x000000007490F000-memory.dmp

    Filesize

    124KB

  • memory/2972-239-0x0000000074910000-0x0000000074928000-memory.dmp

    Filesize

    96KB