Threat name:
CryptOne, Mars Stealer, PureLog Stealer,
Alert
Classification:
troj.spyw.expl.evad
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large array initializations
Adds extensions / path to Windows Defender exclusion list (Registry)
Allocates memory in foreign processes
Antivirus detection for dropped file
Antivirus detection for URL or domain
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to inject threads in other processes
Creates HTML files with .exe extension (expired dropper behavior)
Creates multiple autostart registry keys
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Disable Windows Defender real time protection (registry)
Disables Windows Defender (deletes autostart)
Drops PE files to the document folder of the user
Exclude list of file types from scheduled, custom, and real-time scanning
Found direct / indirect Syscall (likely to bypass EDR)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Found stalling execution ending in API Sleep call
Hides threads from debuggers
Injects a PE file into a foreign processes
Installs new ROOT certificates
Machine Learning detection for dropped file
Malicious sample detected (through community Yara rule)
Modifies Group Policy settings
Modifies power options to not sleep / hibernate
Modifies Windows Defender protection settings
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
PE file has nameless sections
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses process hollowing technique
Sample uses string decryption to hide its real strings
Sigma detected: Disable power options
Suspicious powershell command line found
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to download and execute files (via powershell)
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Tries to steal Mail credentials (via file / registry access)
Uses powercfg.exe to modify the power settings
Uses schtasks.exe or at.exe to add and modify task schedules
Writes to foreign memory regions
Yara detected CryptOne packer
Yara detected Mars stealer
Yara detected Powershell download and execute
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected RisePro Stealer
Yara detected UAC Bypass using CMSTP
Yara detected Vidar stealer
behaviorgraph
top1
signatures2
2
Behavior Graph
ID:
1442434
Sample:
SecuriteInfo.com.Trojan.Sig...
Startdate:
16/05/2024
Architecture:
WINDOWS
Score:
100
142
Multi AV Scanner detection
for domain / URL
2->142
144
Found malware configuration
2->144
146
Malicious sample detected
(through community Yara
rule)
2->146
148
25 other signatures
2->148
10
SecuriteInfo.com.Trojan.Siggen28.47309.32751.2518.exe
11
56
2->10
started
15
MPGPH131.exe
2->15
started
17
svchost.exe
2->17
started
19
3 other processes
2->19
process3
dnsIp4
128
94.232.45.38
WELLWEBNL
Russian Federation
10->128
130
93.186.225.194
VKONTAKTE-SPB-AShttpvkcomRU
Russian Federation
10->130
132
20 other IPs or domains
10->132
112
C:\Users\...\sM6UmohAA71uiHsDAlC51h9v.exe, PE32
10->112
dropped
114
C:\Users\...\sJlRGrk8i3Q84wrCWjW_3qv5.exe, PE32
10->114
dropped
116
C:\Users\...\olZh4mXNqVNC0SrIRlFH5eUP.exe, PE32
10->116
dropped
118
25 other malicious files
10->118
dropped
190
Query firmware table
information (likely
to detect VMs)
10->190
192
Drops PE files to the
document folder of the
user
10->192
194
Tries to detect sandboxes
and other dynamic analysis
tools (window names)
10->194
200
11 other signatures
10->200
21
7srdi6urV9g45ZFWEyjj3Mjd.exe
10->21
started
24
olZh4mXNqVNC0SrIRlFH5eUP.exe
10->24
started
27
AgBpwJw9_U2wNWosH_G7qcng.exe
10->27
started
30
13 other processes
10->30
196
Multi AV Scanner detection
for dropped file
15->196
198
Machine Learning detection
for dropped file
15->198
file5
signatures6
process7
dnsIp8
94
C:\Users\...\7srdi6urV9g45ZFWEyjj3Mjd.tmp, PE32
21->94
dropped
32
7srdi6urV9g45ZFWEyjj3Mjd.tmp
21->32
started
166
Tries to detect sandboxes
and other dynamic analysis
tools (process name
or module or function)
24->166
168
Writes to foreign memory
regions
24->168
170
Allocates memory in
foreign processes
24->170
172
Injects a PE file into
a foreign processes
24->172
35
RegAsm.exe
24->35
started
39
RegAsm.exe
24->39
started
41
conhost.exe
24->41
started
134
185.172.128.151
NADYMSS-ASRU
Russian Federation
27->134
96
C:\Users\user\AppData\...\softokn3[1].dll, PE32
27->96
dropped
98
C:\Users\user\AppData\Local\...\nss3[1].dll, PE32
27->98
dropped
100
C:\Users\user\AppData\...\mozglue[1].dll, PE32
27->100
dropped
108
9 other files (5 malicious)
27->108
dropped
174
Detected unpacking (changes
PE section rights)
27->174
176
Detected unpacking (overwrites
its own PE header)
27->176
178
Found many strings related
to Crypto-Wallets (likely
being stolen)
27->178
186
4 other signatures
27->186
136
5.42.96.54
RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
Russian Federation
30->136
138
5.42.96.55
RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
Russian Federation
30->138
140
3 other IPs or domains
30->140
102
C:\Users\user\...\VZhOkBlq6DYIgkRxaqbY.exe, PE32
30->102
dropped
104
C:\Users\user\...\Bpr3HwQYeKVfcyoUsXKu.exe, PE32
30->104
dropped
106
C:\Users\user\AppData\Local\...\INetC.dll, PE32
30->106
dropped
110
17 other malicious files
30->110
dropped
180
Overwrites code with
unconditional jumps
- possibly settings
hooks in foreign process
30->180
182
Tries to steal Mail
credentials (via file
/ registry access)
30->182
184
Found stalling execution
ending in API Sleep
call
30->184
188
10 other signatures
30->188
43
cmd.exe
30->43
started
45
Install.exe
30->45
started
47
RegAsm.exe
30->47
started
49
10 other processes
30->49
file9
signatures10
process11
dnsIp12
74
C:\Users\user\AppData\Local\...\_setup64.tmp, PE32+
32->74
dropped
76
C:\Users\user\AppData\Local\...\_iscrypt.dll, PE32
32->76
dropped
78
C:\Users\user\AppData\Local\...\_RegDLL.tmp, PE32
32->78
dropped
88
34 other files (23 malicious)
32->88
dropped
51
glorytxvoice.exe
32->51
started
120
95.217.240.101
HETZNER-ASDE
Germany
35->120
122
23.61.62.148
AKAMAI-ASUS
United States
35->122
80
C:\Users\user\AppData\...\softokn3[1].dll, PE32
35->80
dropped
82
C:\Users\user\AppData\Local\...\nss3[1].dll, PE32
35->82
dropped
84
C:\Users\user\AppData\...\mozglue[1].dll, PE32
35->84
dropped
90
10 other files (6 malicious)
35->90
dropped
150
Tries to harvest and
steal browser information
(history, passwords,
etc)
35->150
152
Queries sensitive video
device information (via
WMI, Win32_VideoController,
often done to detect
virtual machines)
39->152
154
Queries sensitive disk
information (via WMI,
Win32_DiskDrive, often
done to detect virtual
machines)
39->154
156
Suspicious powershell
command line found
43->156
158
Tries to download and
execute files (via powershell)
43->158
54
powershell.exe
43->54
started
58
conhost.exe
43->58
started
86
C:\Users\user\AppData\Local\...\Install.exe, PE32
45->86
dropped
60
Install.exe
45->60
started
124
5.42.65.85
RU-KSTVKolomnaGroupofcompaniesGuarantee-tvRU
Russian Federation
47->124
160
Installs new ROOT certificates
47->160
62
conhost.exe
49->62
started
64
conhost.exe
49->64
started
66
conhost.exe
49->66
started
68
5 other processes
49->68
file13
signatures14
process15
dnsIp16
92
C:\ProgramData\...\TLocalStream 4.13.66.exe, PE32
51->92
dropped
126
18.239.229.31
AMAZON-02US
United States
54->126
162
Installs new ROOT certificates
54->162
164
Modifies Windows Defender
protection settings
60->164
70
cmd.exe
60->70
started
file17
signatures18
process19
process20
72
conhost.exe
70->72
started
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.