Overview
overview
10Static
static
36922e893e8...20.zip
windows10-2004-x64
6922e893e8...20.zip
windows10-2004-x64
6922e893e8...20.zip
windows10-ltsc_2021-x64
6922e893e8...20.zip
windows11-21h2-x64
6922e893e8...20.zip
windows7-x64
131d6fb920...b1.exe
windows10-ltsc_2021-x64
10131d6fb920...b1.exe
windows10-2004-x64
10131d6fb920...b1.exe
windows10-ltsc_2021-x64
10131d6fb920...b1.exe
windows11-21h2-x64
10131d6fb920...b1.exe
windows7-x64
10Analysis
-
max time kernel
237s -
max time network
242s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
26/03/2025, 10:06
Static task
static1
Behavioral task
behavioral1
Sample
6922e893e81974f1e08e48308d8ad02bee4c79a924ec9f7d594024ba63582b20.zip
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
6922e893e81974f1e08e48308d8ad02bee4c79a924ec9f7d594024ba63582b20.zip
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
6922e893e81974f1e08e48308d8ad02bee4c79a924ec9f7d594024ba63582b20.zip
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral4
Sample
6922e893e81974f1e08e48308d8ad02bee4c79a924ec9f7d594024ba63582b20.zip
Resource
win11-20250313-en
Behavioral task
behavioral5
Sample
6922e893e81974f1e08e48308d8ad02bee4c79a924ec9f7d594024ba63582b20.zip
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
131d6fb9204ceda508075afce9b9b65e429952674e914d224268deb319a0aab1.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral7
Sample
131d6fb9204ceda508075afce9b9b65e429952674e914d224268deb319a0aab1.exe
Resource
win10v2004-20250313-en
Behavioral task
behavioral8
Sample
131d6fb9204ceda508075afce9b9b65e429952674e914d224268deb319a0aab1.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral9
Sample
131d6fb9204ceda508075afce9b9b65e429952674e914d224268deb319a0aab1.exe
Resource
win11-20250313-en
General
-
Target
131d6fb9204ceda508075afce9b9b65e429952674e914d224268deb319a0aab1.exe
-
Size
305KB
-
MD5
4309f4b4bb455f998d1fdf310cd83484
-
SHA1
4ee10072d4dff28efcd64d8dcd631760868d644b
-
SHA256
131d6fb9204ceda508075afce9b9b65e429952674e914d224268deb319a0aab1
-
SHA512
3d730ec6e3b385a69fa62634f4776e98327bc8f5da6330b109d3de5b37339dcb97cf9bf489c548de23f6ff71b115e921d5179cf2606eba61783851462ba807bf
-
SSDEEP
6144:zWmk/wokUNpuDoAVUx99rpABXHxjdgwJids6m+8suhyiP:NswuNpQv299rpAVHxJgw0dsp+dTiP
Malware Config
Extracted
cryptbot
befqlo52.top
mortos05.top
-
payload_url
http://mincir07.top/download.php?file=lv.exe
Signatures
-
Cryptbot family
-
Deletes itself 1 IoCs
pid Process 1288 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 131d6fb9204ceda508075afce9b9b65e429952674e914d224268deb319a0aab1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 131d6fb9204ceda508075afce9b9b65e429952674e914d224268deb319a0aab1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 131d6fb9204ceda508075afce9b9b65e429952674e914d224268deb319a0aab1.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3008 timeout.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2548 wrote to memory of 1288 2548 131d6fb9204ceda508075afce9b9b65e429952674e914d224268deb319a0aab1.exe 30 PID 2548 wrote to memory of 1288 2548 131d6fb9204ceda508075afce9b9b65e429952674e914d224268deb319a0aab1.exe 30 PID 2548 wrote to memory of 1288 2548 131d6fb9204ceda508075afce9b9b65e429952674e914d224268deb319a0aab1.exe 30 PID 2548 wrote to memory of 1288 2548 131d6fb9204ceda508075afce9b9b65e429952674e914d224268deb319a0aab1.exe 30 PID 1288 wrote to memory of 3008 1288 cmd.exe 32 PID 1288 wrote to memory of 3008 1288 cmd.exe 32 PID 1288 wrote to memory of 3008 1288 cmd.exe 32 PID 1288 wrote to memory of 3008 1288 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\131d6fb9204ceda508075afce9b9b65e429952674e914d224268deb319a0aab1.exeC:\Users\Admin\AppData\Local\Temp\131d6fb9204ceda508075afce9b9b65e429952674e914d224268deb319a0aab1.exe bcdedit /c set shutdown /r /f nbios /t 51⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\fQekqnvghc & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\131d6fb9204ceda508075afce9b9b65e429952674e914d224268deb319a0aab1.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3008
-
-