Overview
overview
10Static
static
10idaprocrac....3.zip
windows10-1703-x64
1IDA Pro 8....PA.zip
windows10-1703-x64
1__MACOSX/I...n7.til
windows10-1703-x64
3__MACOSX/I...n8.til
windows10-1703-x64
3__MACOSX/I...81.til
windows10-1703-x64
3__MACOSX/I...03.til
windows10-1703-x64
3__MACOSX/I...xp.til
windows10-1703-x64
3__MACOSX/I...fi.til
windows10-1703-x64
3__MACOSX/I...64.til
windows10-1703-x64
3__MACOSX/I...10.til
windows10-1703-x64
3__MACOSX/I...64.til
windows10-1703-x64
3__MACOSX/I...11.til
windows10-1703-x64
3__MACOSX/I...in.til
windows10-1703-x64
3__MACOSX/I...64.til
windows10-1703-x64
3__MACOSX/I...c9.til
windows10-1703-x64
3__MACOSX/I...os.til
windows10-1703-x64
3__MACOSX/I...s2.til
windows10-1703-x64
3__MACOSX/I...os.til
windows10-1703-x64
3__MACOSX/I...s2.til
windows10-1703-x64
3__MACOSX/I...um.til
windows10-1703-x64
3__MACOSX/I...km.til
windows10-1703-x64
3__MACOSX/I...um.til
windows10-1703-x64
3__MACOSX/I...dm.til
windows10-1703-x64
3__MACOSX/I...et.til
windows10-1703-x64
3__MACOSX/I...on.til
windows10-1703-x64
3__MACOSX/I...pc.til
windows10-1703-x64
3__MACOSX/I...64.til
windows10-1703-x64
3__MACOSX/I...ix.til
windows10-1703-x64
3__MACOSX/I...dk.til
windows10-1703-x64
3__MACOSX/I...rc.til
windows10-1703-x64
3IDA SDK and Tools.7z
windows10-1703-x64
3ida_keygen.exe
windows10-1703-x64
1Analysis
-
max time kernel
104s -
max time network
144s -
platform
windows10-1703_x64 -
resource
win10-20240214-en -
resource tags
arch:x64arch:x86image:win10-20240214-enlocale:en-usos:windows10-1703-x64system -
submitted
18-02-2024 16:18
Behavioral task
behavioral1
Sample
idaprocrackeado8.3.zip
Resource
win10-20240214-en
Behavioral task
behavioral2
Sample
IDA Pro 8.3 (x86, x86_64)_BGSPA.zip
Resource
win10-20240214-en
Behavioral task
behavioral3
Sample
__MACOSX/IDA Pro 8.3 (x86, x86_64)/til/pc/._ntddk_win7.til
Resource
win10-20240214-en
Behavioral task
behavioral4
Sample
__MACOSX/IDA Pro 8.3 (x86, x86_64)/til/pc/._ntddk_win8.til
Resource
win10-20240214-en
Behavioral task
behavioral5
Sample
__MACOSX/IDA Pro 8.3 (x86, x86_64)/til/pc/._ntddk_win81.til
Resource
win10-20240214-en
Behavioral task
behavioral6
Sample
__MACOSX/IDA Pro 8.3 (x86, x86_64)/til/pc/._ntddk_ws03.til
Resource
win10-20240214-en
Behavioral task
behavioral7
Sample
__MACOSX/IDA Pro 8.3 (x86, x86_64)/til/pc/._ntddk_xp.til
Resource
win10-20240214-en
Behavioral task
behavioral8
Sample
__MACOSX/IDA Pro 8.3 (x86, x86_64)/til/pc/._uefi.til
Resource
win10-20240214-en
Behavioral task
behavioral9
Sample
__MACOSX/IDA Pro 8.3 (x86, x86_64)/til/pc/._uefi64.til
Resource
win10-20240214-en
Behavioral task
behavioral10
Sample
__MACOSX/IDA Pro 8.3 (x86, x86_64)/til/pc/._vc10.til
Resource
win10-20240214-en
Behavioral task
behavioral11
Sample
__MACOSX/IDA Pro 8.3 (x86, x86_64)/til/pc/._vc10_64.til
Resource
win10-20240214-en
Behavioral task
behavioral12
Sample
__MACOSX/IDA Pro 8.3 (x86, x86_64)/til/pc/._vc11.til
Resource
win10-20240214-en
Behavioral task
behavioral13
Sample
__MACOSX/IDA Pro 8.3 (x86, x86_64)/til/pc/._vc6win.til
Resource
win10-20240214-en
Behavioral task
behavioral14
Sample
__MACOSX/IDA Pro 8.3 (x86, x86_64)/til/pc/._vc8amd64.til
Resource
win10-20240214-en
Behavioral task
behavioral15
Sample
__MACOSX/IDA Pro 8.3 (x86, x86_64)/til/pc/._vc9.til
Resource
win10-20240214-en
Behavioral task
behavioral16
Sample
__MACOSX/IDA Pro 8.3 (x86, x86_64)/til/pc/._w16dos.til
Resource
win10-20240214-en
Behavioral task
behavioral17
Sample
__MACOSX/IDA Pro 8.3 (x86, x86_64)/til/pc/._w16os2.til
Resource
win10-20240214-en
Behavioral task
behavioral18
Sample
__MACOSX/IDA Pro 8.3 (x86, x86_64)/til/pc/._w32dos.til
Resource
win10-20240214-en
Behavioral task
behavioral19
Sample
__MACOSX/IDA Pro 8.3 (x86, x86_64)/til/pc/._w32os2.til
Resource
win10-20240214-en
Behavioral task
behavioral20
Sample
__MACOSX/IDA Pro 8.3 (x86, x86_64)/til/pc/._wdk81_um.til
Resource
win10-20240214-en
Behavioral task
behavioral21
Sample
__MACOSX/IDA Pro 8.3 (x86, x86_64)/til/pc/._wdk8_km.til
Resource
win10-20240214-en
Behavioral task
behavioral22
Sample
__MACOSX/IDA Pro 8.3 (x86, x86_64)/til/pc/._wdk8_um.til
Resource
win10-20240214-en
Behavioral task
behavioral23
Sample
__MACOSX/IDA Pro 8.3 (x86, x86_64)/til/pc/._wdm.til
Resource
win10-20240214-en
Behavioral task
behavioral24
Sample
__MACOSX/IDA Pro 8.3 (x86, x86_64)/til/pc/._wnet.til
Resource
win10-20240214-en
Behavioral task
behavioral25
Sample
__MACOSX/IDA Pro 8.3 (x86, x86_64)/til/ppc/._carbon.til
Resource
win10-20240214-en
Behavioral task
behavioral26
Sample
__MACOSX/IDA Pro 8.3 (x86, x86_64)/til/ppc/._gnulnx_ppc.til
Resource
win10-20240214-en
Behavioral task
behavioral27
Sample
__MACOSX/IDA Pro 8.3 (x86, x86_64)/til/ppc/._gnulnx_ppc64.til
Resource
win10-20240214-en
Behavioral task
behavioral28
Sample
__MACOSX/IDA Pro 8.3 (x86, x86_64)/til/ppc/._osxunix.til
Resource
win10-20240214-en
Behavioral task
behavioral29
Sample
__MACOSX/IDA Pro 8.3 (x86, x86_64)/til/ppc/._ppceldk.til
Resource
win10-20240214-en
Behavioral task
behavioral30
Sample
__MACOSX/IDA Pro 8.3 (x86, x86_64)/til/sparc/._sparc.til
Resource
win10-20240214-en
Behavioral task
behavioral31
Sample
IDA SDK and Tools.7z
Resource
win10-20240214-en
Behavioral task
behavioral32
Sample
ida_keygen.exe
Resource
win10-20240214-en
General
-
Target
IDA SDK and Tools.7z
-
Size
65.9MB
-
MD5
423313cb643ecac1abd4f57d2d2c51f6
-
SHA1
03368885028f85829c987ca4baf0366382d16241
-
SHA256
6f3b8e982d3a0ca8288fcec3c5f3da8fabd9d333005cfc877a75899af65364e6
-
SHA512
87e3b842a13e3f5356320bdb295aac02380bb4b8849c822a7c31c8881c766c20cd5e66d085f63097b892a6e2e09f1b8e66209a339fd8177448684c1dd47346e7
-
SSDEEP
1572864:YU4sYSP4MRKrB7rfwh0YlXZ5ggssj8zOtApPUD9rW8Te+:EuZKBYlp5BzgjJUDDK+
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
cmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-392952528-2979573054-2586089985-1000_Classes\Local Settings cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
7zFM.exedescription pid process Token: SeRestorePrivilege 4264 7zFM.exe Token: 35 4264 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
7zFM.exepid process 4264 7zFM.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
cmd.exedescription pid process target process PID 4464 wrote to memory of 4264 4464 cmd.exe 7zFM.exe PID 4464 wrote to memory of 4264 4464 cmd.exe 7zFM.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\IDA SDK and Tools.7z"1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\IDA SDK and Tools.7z"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4264
-