Overview
overview
5Static
static
Cracker.dll
windows7-x64
1Cracker.dll
windows10-2004-x64
1Data/Packa...in.xml
windows7-x64
1Data/Packa...in.xml
windows10-2004-x64
1Data/Packa...ls.xml
windows7-x64
1Data/Packa...ls.xml
windows10-2004-x64
1Microsoft ...ed.exe
windows7-x64
5Microsoft ...ed.exe
windows10-2004-x64
5Resource.dll
windows7-x64
1Resource.dll
windows10-2004-x64
1libGLESv2.dll
windows7-x64
1libGLESv2.dll
windows10-2004-x64
1Resubmissions
31/01/2023, 21:40
230131-1jhk5acd7z 531/01/2023, 21:36
230131-1gd5xscd7v 331/01/2023, 21:32
230131-1dzbpacd6y 5Analysis
-
max time kernel
46s -
max time network
62s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
31/01/2023, 21:32
Static task
static1
Behavioral task
behavioral1
Sample
Cracker.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Cracker.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
Data/Packaged/Main.xml
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
Data/Packaged/Main.xml
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
Data/Packaged/Utils.xml
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
Data/Packaged/Utils.xml
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
Microsoft Office Cracked.exe
Resource
win7-20220901-en
Behavioral task
behavioral8
Sample
Microsoft Office Cracked.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
Resource.dll
Resource
win7-20221111-en
Behavioral task
behavioral10
Sample
Resource.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
libGLESv2.dll
Resource
win7-20221111-en
Behavioral task
behavioral12
Sample
libGLESv2.dll
Resource
win10v2004-20221111-en
General
-
Target
Microsoft Office Cracked.exe
-
Size
715.3MB
-
MD5
70c3d7f58bc5a960480117a7609e7d45
-
SHA1
4d3b7617b99ec1ad0bf86a599daa7e5138d7939a
-
SHA256
eb22dcbc6620bfbcb4746ae369eef59ba6c49d7f2d5cb87b5f8f12058a6cfa9e
-
SHA512
238351368341cd63e93a47ea399e6226a6de702f5dddd053dd22e4ba382bb10b3f42d41c55660ce9c3fb8033cd4cba642710e5308840c9968cb106f45aa5ddc1
-
SSDEEP
98304:+r/fQ+GX+PuArhlhCkBvJqKUIXn0OTLb6QgYbXpAXrN3LMg:+rnQ+4kDh95JjdnPTLb6QgQpaJ7M
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2040 set thread context of 896 2040 Microsoft Office Cracked.exe 27 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 896 InstallUtil.exe 896 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 896 InstallUtil.exe Token: 33 2004 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2004 AUDIODG.EXE Token: 33 2004 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2004 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2040 wrote to memory of 896 2040 Microsoft Office Cracked.exe 27 PID 2040 wrote to memory of 896 2040 Microsoft Office Cracked.exe 27 PID 2040 wrote to memory of 896 2040 Microsoft Office Cracked.exe 27 PID 2040 wrote to memory of 896 2040 Microsoft Office Cracked.exe 27 PID 2040 wrote to memory of 896 2040 Microsoft Office Cracked.exe 27 PID 2040 wrote to memory of 896 2040 Microsoft Office Cracked.exe 27 PID 2040 wrote to memory of 896 2040 Microsoft Office Cracked.exe 27 PID 2040 wrote to memory of 896 2040 Microsoft Office Cracked.exe 27 PID 2040 wrote to memory of 896 2040 Microsoft Office Cracked.exe 27 PID 2040 wrote to memory of 896 2040 Microsoft Office Cracked.exe 27 PID 2040 wrote to memory of 896 2040 Microsoft Office Cracked.exe 27 PID 2040 wrote to memory of 896 2040 Microsoft Office Cracked.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Office Cracked.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Office Cracked.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\InstallUtil.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:896
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:1544
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4881⤵
- Suspicious use of AdjustPrivilegeToken
PID:2004