Analysis
-
max time kernel
109s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
31/01/2023, 21:49
Static task
static1
Behavioral task
behavioral1
Sample
Microsoft Office Cracked.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Microsoft Office Cracked.exe
Resource
win10v2004-20221111-en
General
-
Target
Microsoft Office Cracked.exe
-
Size
715.3MB
-
MD5
70c3d7f58bc5a960480117a7609e7d45
-
SHA1
4d3b7617b99ec1ad0bf86a599daa7e5138d7939a
-
SHA256
eb22dcbc6620bfbcb4746ae369eef59ba6c49d7f2d5cb87b5f8f12058a6cfa9e
-
SHA512
238351368341cd63e93a47ea399e6226a6de702f5dddd053dd22e4ba382bb10b3f42d41c55660ce9c3fb8033cd4cba642710e5308840c9968cb106f45aa5ddc1
-
SSDEEP
98304:+r/fQ+GX+PuArhlhCkBvJqKUIXn0OTLb6QgYbXpAXrN3LMg:+rnQ+4kDh95JjdnPTLb6QgQpaJ7M
Malware Config
Signatures
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3668 set thread context of 4776 3668 Microsoft Office Cracked.exe 80 PID 456 set thread context of 220 456 Microsoft Office Cracked.exe 100 PID 3640 set thread context of 1352 3640 Microsoft Office Cracked.exe 102 -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 4776 InstallUtil.exe 4776 InstallUtil.exe 220 InstallUtil.exe 220 InstallUtil.exe 220 InstallUtil.exe 1352 InstallUtil.exe 1352 InstallUtil.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4776 InstallUtil.exe Token: SeDebugPrivilege 220 InstallUtil.exe Token: SeDebugPrivilege 1352 InstallUtil.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3668 wrote to memory of 4776 3668 Microsoft Office Cracked.exe 80 PID 3668 wrote to memory of 4776 3668 Microsoft Office Cracked.exe 80 PID 3668 wrote to memory of 4776 3668 Microsoft Office Cracked.exe 80 PID 3668 wrote to memory of 4776 3668 Microsoft Office Cracked.exe 80 PID 3668 wrote to memory of 4776 3668 Microsoft Office Cracked.exe 80 PID 3668 wrote to memory of 4776 3668 Microsoft Office Cracked.exe 80 PID 3668 wrote to memory of 4776 3668 Microsoft Office Cracked.exe 80 PID 3668 wrote to memory of 4776 3668 Microsoft Office Cracked.exe 80 PID 456 wrote to memory of 220 456 Microsoft Office Cracked.exe 100 PID 456 wrote to memory of 220 456 Microsoft Office Cracked.exe 100 PID 456 wrote to memory of 220 456 Microsoft Office Cracked.exe 100 PID 456 wrote to memory of 220 456 Microsoft Office Cracked.exe 100 PID 456 wrote to memory of 220 456 Microsoft Office Cracked.exe 100 PID 456 wrote to memory of 220 456 Microsoft Office Cracked.exe 100 PID 456 wrote to memory of 220 456 Microsoft Office Cracked.exe 100 PID 456 wrote to memory of 220 456 Microsoft Office Cracked.exe 100 PID 3640 wrote to memory of 1352 3640 Microsoft Office Cracked.exe 102 PID 3640 wrote to memory of 1352 3640 Microsoft Office Cracked.exe 102 PID 3640 wrote to memory of 1352 3640 Microsoft Office Cracked.exe 102 PID 3640 wrote to memory of 1352 3640 Microsoft Office Cracked.exe 102 PID 3640 wrote to memory of 1352 3640 Microsoft Office Cracked.exe 102 PID 3640 wrote to memory of 1352 3640 Microsoft Office Cracked.exe 102 PID 3640 wrote to memory of 1352 3640 Microsoft Office Cracked.exe 102 PID 3640 wrote to memory of 1352 3640 Microsoft Office Cracked.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Office Cracked.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Office Cracked.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\InstallUtil.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4776
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3916
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Office Cracked.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Office Cracked.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\InstallUtil.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:220
-
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Office Cracked.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Office Cracked.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\InstallUtil.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1352
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD528d7fcc2b910da5e67ebb99451a5f598
SHA1a5bf77a53eda1208f4f37d09d82da0b9915a6747
SHA2562391511d0a66ed9f84ae54254f51c09e43be01ad685db80da3201ec880abd49c
SHA5122d8eb65cbf04ca506f4ef3b9ae13ccf05ebefab702269ba70ffd1ce9e6c615db0a3ee3ac0e81a06f546fc3250b7b76155dd51241c41b507a441b658c8e761df6
-
Filesize
2KB
MD551c4eaf7e24cb6fac3c0055d2a6b38d9
SHA1719c51e2ca9c4a8e8b3f424f516d01205aa1928e
SHA2563e87ea4d3e6dd879e5cd808b1745857774948e2cc457e24de850a5ca5f3d8a5b
SHA512171119f9a703b65e26b89ae0f6e90324641b68dd7db2c1c64b3eba442fa1714d5ab992768e864107951cc1e495fd7815758dd1964397faeeb43b816240ee58d9