Analysis
-
max time kernel
148s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/02/2025, 18:49
Static task
static1
Behavioral task
behavioral1
Sample
Xtreme Free Commission Bot/Xtreme Free Commission Bot.exe
Resource
win7-20240903-en
General
-
Target
Xtreme Free Commission Bot/Xtreme Free Commission Bot.exe
-
Size
2.1MB
-
MD5
e652c139242bac4059bfcf8371f0870a
-
SHA1
d7945051e975384d8d848bb433cae920f824bf4b
-
SHA256
67d25b483962a7f6c59c55e7a62a69a553ab81e19c1deefd91f79da85fd68437
-
SHA512
a39e851ae0afb7485464fee17cde747867fda924164d634492abdd00cd64518a628db3b01dd12789c4ffdd11b607eb3f79084331a41bf98845ce744860792503
-
SSDEEP
49152:Kyi/XpI4/xTcpdJutQZYW2P7LNWgy4ChJS+03:KyJpvuVWQhQJS73
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x0005000000019838-21.dat cryptone -
Downloads MZ/PE file 11 IoCs
flow pid Process 7 2104 Xtreme Free Commission Bot.exe 7 2104 Xtreme Free Commission Bot.exe 7 2104 Xtreme Free Commission Bot.exe 7 2104 Xtreme Free Commission Bot.exe 7 2104 Xtreme Free Commission Bot.exe 7 2104 Xtreme Free Commission Bot.exe 7 2104 Xtreme Free Commission Bot.exe 7 2104 Xtreme Free Commission Bot.exe 7 2104 Xtreme Free Commission Bot.exe 7 2104 Xtreme Free Commission Bot.exe 7 2104 Xtreme Free Commission Bot.exe -
Executes dropped EXE 5 IoCs
pid Process 1016 UBotBrowser.exe 1000 UBotBrowser.exe 1312 UBotBrowser.exe 2972 UBotBrowser.exe 1308 UBotBrowser.exe -
Loads dropped DLL 49 IoCs
pid Process 1016 UBotBrowser.exe 1016 UBotBrowser.exe 1016 UBotBrowser.exe 1016 UBotBrowser.exe 1016 UBotBrowser.exe 1016 UBotBrowser.exe 1016 UBotBrowser.exe 1016 UBotBrowser.exe 1000 UBotBrowser.exe 1000 UBotBrowser.exe 1000 UBotBrowser.exe 1000 UBotBrowser.exe 1000 UBotBrowser.exe 1000 UBotBrowser.exe 1000 UBotBrowser.exe 1000 UBotBrowser.exe 1000 UBotBrowser.exe 1000 UBotBrowser.exe 1000 UBotBrowser.exe 1312 UBotBrowser.exe 1312 UBotBrowser.exe 1312 UBotBrowser.exe 1312 UBotBrowser.exe 1312 UBotBrowser.exe 1312 UBotBrowser.exe 1312 UBotBrowser.exe 1312 UBotBrowser.exe 2972 UBotBrowser.exe 2972 UBotBrowser.exe 2972 UBotBrowser.exe 2972 UBotBrowser.exe 2972 UBotBrowser.exe 2972 UBotBrowser.exe 2972 UBotBrowser.exe 2972 UBotBrowser.exe 1308 UBotBrowser.exe 1308 UBotBrowser.exe 1308 UBotBrowser.exe 1308 UBotBrowser.exe 1308 UBotBrowser.exe 1308 UBotBrowser.exe 1308 UBotBrowser.exe 1308 UBotBrowser.exe 2972 UBotBrowser.exe 2972 UBotBrowser.exe 2972 UBotBrowser.exe 1308 UBotBrowser.exe 1308 UBotBrowser.exe 1308 UBotBrowser.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UBotBrowser.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UBotBrowser.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UBotBrowser.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UBotBrowser.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UBotBrowser.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 UBotBrowser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz UBotBrowser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz UBotBrowser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz UBotBrowser.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 UBotBrowser.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 UBotBrowser.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 UBotBrowser.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 UBotBrowser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz UBotBrowser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz UBotBrowser.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2104 Xtreme Free Commission Bot.exe Token: 33 2104 Xtreme Free Commission Bot.exe Token: SeIncBasePriorityPrivilege 2104 Xtreme Free Commission Bot.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2104 wrote to memory of 1016 2104 Xtreme Free Commission Bot.exe 31 PID 2104 wrote to memory of 1016 2104 Xtreme Free Commission Bot.exe 31 PID 2104 wrote to memory of 1016 2104 Xtreme Free Commission Bot.exe 31 PID 2104 wrote to memory of 1016 2104 Xtreme Free Commission Bot.exe 31 PID 1016 wrote to memory of 1000 1016 UBotBrowser.exe 32 PID 1016 wrote to memory of 1000 1016 UBotBrowser.exe 32 PID 1016 wrote to memory of 1000 1016 UBotBrowser.exe 32 PID 1016 wrote to memory of 1000 1016 UBotBrowser.exe 32 PID 2104 wrote to memory of 1312 2104 Xtreme Free Commission Bot.exe 33 PID 2104 wrote to memory of 1312 2104 Xtreme Free Commission Bot.exe 33 PID 2104 wrote to memory of 1312 2104 Xtreme Free Commission Bot.exe 33 PID 2104 wrote to memory of 1312 2104 Xtreme Free Commission Bot.exe 33 PID 1312 wrote to memory of 2972 1312 UBotBrowser.exe 34 PID 1312 wrote to memory of 2972 1312 UBotBrowser.exe 34 PID 1312 wrote to memory of 2972 1312 UBotBrowser.exe 34 PID 1312 wrote to memory of 2972 1312 UBotBrowser.exe 34 PID 1016 wrote to memory of 1308 1016 UBotBrowser.exe 35 PID 1016 wrote to memory of 1308 1016 UBotBrowser.exe 35 PID 1016 wrote to memory of 1308 1016 UBotBrowser.exe 35 PID 1016 wrote to memory of 1308 1016 UBotBrowser.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\Xtreme Free Commission Bot\Xtreme Free Commission Bot.exe"C:\Users\Admin\AppData\Local\Temp\Xtreme Free Commission Bot\Xtreme Free Commission Bot.exe"1⤵
- Downloads MZ/PE file
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Roaming\UBot Studio\Browser\4.1.4\UBotBrowser.exe"C:\Users\Admin\AppData\Roaming\UBot Studio\Browser\4.1.4\UBotBrowser.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Users\Admin\AppData\Roaming\UBot Studio\Browser\4.1.4\UBotBrowser.exe"C:\Users\Admin\AppData\Roaming\UBot Studio\Browser\4.1.4\UBotBrowser.exe" --type=renderer --no-sandbox --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.7 (KHTML, like Gecko) Chrome/16.0.912.77 Safari/535.7" --enable-logging --log-level=0 --lang=en-US --awesomium-package-path="C:\Users\Admin\AppData\Roaming\UBot Studio\Browser\4.1.4" --user-data-dir=C:\Users\Admin\AppData\Local\Temp\tmp19A8.tmp --awesomium-log-path="C:\Users\Admin\AppData\Roaming\UBot Studio" --channel=1016.010CD000.8482711323⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:1000
-
-
C:\Users\Admin\AppData\Roaming\UBot Studio\Browser\4.1.4\UBotBrowser.exe"C:\Users\Admin\AppData\Roaming\UBot Studio\Browser\4.1.4\UBotBrowser.exe" --type=renderer --no-sandbox --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.7 (KHTML, like Gecko) Chrome/16.0.912.77 Safari/535.7" --enable-logging --log-level=0 --lang=en-US --awesomium-package-path="C:\Users\Admin\AppData\Roaming\UBot Studio\Browser\4.1.4" --user-data-dir=C:\Users\Admin\AppData\Local\Temp\tmp19A8.tmp --awesomium-log-path="C:\Users\Admin\AppData\Roaming\UBot Studio" --channel=1016.010CD780.13498234063⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:1308
-
-
-
C:\Users\Admin\AppData\Roaming\UBot Studio\Browser\4.1.4\UBotBrowser.exe"C:\Users\Admin\AppData\Roaming\UBot Studio\Browser\4.1.4\UBotBrowser.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Roaming\UBot Studio\Browser\4.1.4\UBotBrowser.exe"C:\Users\Admin\AppData\Roaming\UBot Studio\Browser\4.1.4\UBotBrowser.exe" --type=renderer --no-sandbox --user-agent="Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.7 (KHTML, like Gecko) Chrome/16.0.912.77 Safari/535.7" --enable-logging --log-level=0 --lang=en-US --awesomium-package-path="C:\Users\Admin\AppData\Roaming\UBot Studio\Browser\4.1.4" --user-data-dir=C:\Users\Admin\AppData\Local\Temp\tmp20AB.tmp --awesomium-log-path="C:\Users\Admin\AppData\Roaming\UBot Studio" --channel=1312.010CD000.13011805393⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2972
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
505B
MD5d87a7a1d63489a10ebf78db95bcaee67
SHA12688e7885dd0703406da0a00c78bfd72823524d4
SHA256aa94e2044926d4b3f71d467fbcdb4ec34f1ab91dfa3508680893085ef327fcf3
SHA5127856f5417c2309c3229caf79e523389988c31e2f119a6659e0b3ee2b5c26d7f6ed7472ed396fe605ebe9f14d33f7eae41aadb818ac71b7e2102b502289360082
-
Filesize
372B
MD5ad847a49582e86ddb577fa3ffdefc7bf
SHA17493583dae84579fb32c88d63479e82ed8984302
SHA256c637fd008fc66d9f75f2a7311a874be2c75f72bb6c4c2de274a761d62fd17c02
SHA51267e9430cb84143ddc5a0b75ba3f6abc722d6d8abd61465335cac6ff5e9b194761ed6fc9a0bc7ced473b59d9897ad5e4551e2fa4ce3dc7224f49963a16360825a
-
Filesize
20.4MB
MD5b86a78256b8632cde4993321b31011aa
SHA1aaa03e1a11d13e2d3e66398ed171bf9f67a08cbb
SHA256ffc70911b66bf551e9c72163d45313ead78ff4b2ff2f31fc2bd63377f3a111d2
SHA5127552a2e276b55e19b1ea8b9363f8071ce6dfa2f557be8fec5d0ccd079d4d6463eeeb6ff49ed53a885f4c7cb6624f5391ffaaf271057e4210447508c320a6d34e
-
Filesize
559KB
MD5f4104bc888bb12cc219abc6abbafe6e9
SHA10db16dcabcf723924ec5ed006a2d9a2fecfe8b9f
SHA256f88dea4eefd7c8a56c09310a996c53b30db2f243d8a9c4d5adf37cc2a3e12ce2
SHA5126598f887080899bf322d9e2b5736e2de143d48551da89cc469abcb743bcedfd6659f5fd644cc5156b98f404b0f1e0e75e6524e07fecc3d98bc3e40b62b44ecc6
-
Filesize
692KB
MD5cc421c5be8c8a8961d4465a454fda42d
SHA1d3c41532bb702b7b422296a110e3c2c0a5e263f4
SHA2565938a4d445897dec80cfec39391047eb9a8971b2c3a8f438dacb15ce68f396ea
SHA512b00771f48f227c1cb6b960f607c52da60d49e282b2c6a0fd314322449f4f27ab5e8da251a2ee38341bae9b31a15619b9adba41fe8a0e658ccf562e718a8c4cd3
-
Filesize
10.4MB
MD51137214e8e4fbc4152a347e0d6feb076
SHA15b5a418c06896bb5556acb6fc893d9d969c70511
SHA256503e0fa0a18cf2d3e30fb9ee3c6cbc8368463d5194207c2946d6113585e5fff6
SHA512e24a2e68abc937191f73582dccb8f20eec857bbbebc0908747a4266df594a131f06de8764e04e97375181b3a1b4f3ef01bf8bb27fa066a7c6fe7fcc573f0fb24
-
Filesize
114KB
MD57c42bf28d1fb9c55a7402f45f2911771
SHA134e45fc59f73f46b8d364a0a06f15214ae4f2b89
SHA256b7aa5e23e54b76b42d4b2062f28a452a3a4ced662d9ace9ea3d07b5f429a87cc
SHA51271bc04acab9ff906fcd1bed4d8b4b6d9eb0d99ecd1613b789256d7acea5667992de02eb5a1a26ed4bc73027ab6232fcbfc68da6ae30e17a6eb1ed5046b8761b1
-
Filesize
411KB
MD503e9314004f504a14a61c3d364b62f66
SHA10aa3caac24fdf9d9d4c618e2bbf0a063036cd55d
SHA256a3ba6421991241bea9c8334b62c3088f8f131ab906c3cc52113945d05016a35f
SHA5122fcff4439d2759d93c57d49b24f28ae89b7698e284e76ac65fe2b50bdefc23a8cc3c83891d671de4e4c0f036cef810856de79ac2b028aa89a895bf35abff8c8d
-
Filesize
752KB
MD567ec459e42d3081dd8fd34356f7cafc1
SHA11738050616169d5b17b5adac3ff0370b8c642734
SHA2561221a09484964a6f38af5e34ee292b9afefccb3dc6e55435fd3aaf7c235d9067
SHA5129ed1c106df217e0b4e4fbd1f4275486ceba1d8a225d6c7e47b854b0b5e6158135b81be926f51db0ad5c624f9bd1d09282332cf064680dc9f7d287073b9686d33
-
Filesize
1.9MB
MD509a0279fe0c812eabb8c1567200c1c21
SHA173773edc7b7a276d599d0b53f964e0e7353ffb13
SHA256b32078d8f06d201981a5bd308ef2856cee6f3a7d069aaa69ee0ba2b610124f56
SHA512a0a51a444f1d61120dc0568572b5ad17dda848364e0496368b2ee63700995ad88061f54eb2f7b45c14eda66f720fee518bc367d6da04a49446836ef661eeac32
-
Filesize
1.2MB
MD53a6a2076d99ec66a53aec251150a3005
SHA12377125e1f654c446b22b6afcf7801164f7e5dec
SHA256492389d77e543f8762e857b50cbba036da984a242ee9ce3bf4d225a8760568d9
SHA51235d62d281a70ec196a7023a769a91a614c4c4f9ff89626457033aebc8af6c4d269099b7e386ad97d7b76f1f4dfaf7b175135c6b67e727955217613d81cc289fa
-
Filesize
49KB
MD5631945c6518533a9fadaaa8e98f4ab5b
SHA134b856ebdda19b5ab96ed77fb5fb82a00cfe023a
SHA2562011268947625670a758382e811c71b597b615f1763f8d30a5195b80da4644fc
SHA5121cbbc26787aeade276b30582124b7c457f352754bddf72a709e90ea884f09cc1327ebba3087ecb3224762438f669f860c640b18b1863995955e429b3ed894372
-
Filesize
1KB
MD578b572c663e9ecd9e0324974bb9283a0
SHA18860ba782247ec5a026f3672d0356c35672c6808
SHA25613484033ae3733a2f7c9cf795db1d8b398e60744297b2794d30662c81bc71e36
SHA512c2f9533ae118289322de212247b0ae21de21ec3828c4a84269639d1f9751432508aa89f919555ee79a9a920ed7c4816db0f8ebc96383a99d4fe8b1ae45645949
-
Filesize
3KB
MD5f4fb837282fa2bd1cc166c490d39d7b1
SHA19b6ea0066d8c04e799841d29187834299c06b8e6
SHA2569d4723a7d9ab4e48f3023652b6c02d56949e2b3c60113fd1bc90995cd41c2074
SHA5120663871bc8a503be782968e9061858e0b2511939b91f558baaa35ddc0403f62533381d6c943d208d4f730fac9c6c0107c221774eb1ec7aeee99a6b5588c25a22
-
Filesize
608B
MD54fe36eeeee4475d35f4f931b70052676
SHA1264a7ff13e7fdf53e4d753171fc26edf4d60c791
SHA25634aea4b2264765dedfbb00678fe18fdd2f0c94dd529bdfea29593a4fa28d7a4e
SHA5120d2201a4e9820ed976c46720aae7992c5142b52fd009f6f843a96c97b94391a0fae216b7bd6fc50ef482e684d7eff1451baadce51c80b44afa33fd94b02bf197
-
Filesize
108KB
MD55d90f884f8ad9601b618bc2d95ab9099
SHA1eacdd1d4aa0484c908f47902f29ffef546aee66f
SHA256f3db947ba841372248e311522ce0600e71dc9cfecab5498ab2c93d3dbdcf01c6
SHA512fe2021685a36fe0fe011b787557105caf3d6d0e602c3913741ec09205dd6124a8a8cb37fcf519825762329731906201ef884fe24d4615d118ffc81497aaa1deb
-
Filesize
67KB
MD556cfb467ae3e8ecce0ed4a7220180e5b
SHA1be5b2c7db9757ffc3dc8024c9f0045e3f62ec1fb
SHA25620ad8789ed8c139d0a41a442f70130508916b78a334adc8dd218a69826625296
SHA5125bb429e0523cc2e30cc30c2660ebe38352108afc9dcb795dcf9dc379d13eb6d003db318af48fb4550b69e413da92a00022425aca09381e38e143703a9c49578a