Overview
overview
10Static
static
3ac39195bc9...c7.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3DowloadX.exe
windows10-2004-x64
9Download.exe
windows10-2004-x64
10ipras.vbs
windows10-2004-x64
8Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
13/04/2025, 02:32
Static task
static1
Behavioral task
behavioral1
Sample
ac39195bc9a3f97ab72f608ba7e86c79b9de337862e290d7d00ba5e0aaf23ac7.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20250410-en
Behavioral task
behavioral7
Sample
DowloadX.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral8
Sample
Download.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral9
Sample
ipras.vbs
Resource
win10v2004-20250410-en
General
-
Target
Download.exe
-
Size
2.1MB
-
MD5
4cd4a697f1f93ab36d37c39c09a889e7
-
SHA1
b434186b165d0bd1a1b9169aef3bf04644c34b78
-
SHA256
6fbec75c90bd2c0ea247d7d21978ed1af82e706f9f2f0b579f7077e35fc16ec0
-
SHA512
f0feff6abe140656c42536c9761c85625d62956adccd6a8075aa95c5ef06247970a42ad1c6065237198ab72a5915a86a14d960c1ed9593d34881f69d2f7429f9
-
SSDEEP
49152:abr8BU1rxuId1OC9bSnkANGF7uE9jpQCSIt2nAZu1Bu32AU7z:iiUHuoQtNG5uOCRC2nMfGLz
Malware Config
Extracted
cryptbot
cede04.info
Signatures
-
Cryptbot family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Download.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Download.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Download.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2645532622-3298555945-705856666-1000\Software\Wine Download.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2596 Download.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Download.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Download.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Download.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2596 Download.exe 2596 Download.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
pid Process 2596 Download.exe 2596 Download.exe 2596 Download.exe 2596 Download.exe 2596 Download.exe 2596 Download.exe 2596 Download.exe 2596 Download.exe 2596 Download.exe 2596 Download.exe 2596 Download.exe 2596 Download.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Download.exe"C:\Users\Admin\AppData\Local\Temp\Download.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2596
Network
MITRE ATT&CK Enterprise v16
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150B
MD5405bc1fdd1ceed11e83db51121be5f85
SHA1fb8dc95f32bb208771dd0daf12469b28343cd794
SHA256e66ab784b5c19ff5d327f646b7add182e087c68d1fa1d65a1aeed99530b32013
SHA512bc2a13aa6c45ba2dc23a187e174dddab4b1e49ba6b51f8f64be521242b8130604261fe868f699e374d3b76dbc8eced8d6311ff85f2a6b0e2909d2ab4179cb1dd
-
Filesize
8KB
MD5a3263048a4b720417578d24136612cde
SHA128e9409639ad6416812892e000df46af87a03168
SHA2564eec53f0e2d2a21ed317e4f149630cc2ce73c4ee308e51ddd613ef403d6c8aed
SHA512202c9db8eaa9de56023f2e07a4048f87db8287b036c76b0007f15150c5568959ef5d4a2652f27cbf27d9c90fb3b6daf644e4b421facdb97c15b7fde517f43f29
-
Filesize
51KB
MD541230cfc61a1bf7fd76252acf19993d4
SHA178130662d4e03e243c605e9a425f71fb26866b9a
SHA256af34f07622e5e4d1c60d7dd3eddef04a7558386db6c59906ef6d1190ed2c49e6
SHA512b869affb1776a9cbe8f64c630f1fa1bd652f7c567858f3905af3e59538ee0b55c7053f6ffeeeb66cd2230e53f2252c0dc281065569bc01636f97d7196960c691