Overview
overview
8Static
static
3Place v2 f...re.lnk
windows7-x64
3Place v2 f...re.lnk
windows10-2004-x64
3build.dll
windows7-x64
1build.dll
windows10-2004-x64
1crack.exe
windows7-x64
1crack.exe
windows10-2004-x64
1map.exe
windows7-x64
8map.exe
windows10-2004-x64
spoof/robl...s!.rtf
windows7-x64
4spoof/robl...s!.rtf
windows10-2004-x64
1spoof/spoof.exe
windows7-x64
1spoof/spoof.exe
windows10-2004-x64
1v2/auth/au...or.exe
windows7-x64
1v2/auth/au...or.exe
windows10-2004-x64
1v2/auth/runtime.dll
windows7-x64
1v2/auth/runtime.dll
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 18:21
Static task
static1
Behavioral task
behavioral1
Sample
Place v2 folder here.lnk
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Place v2 folder here.lnk
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
build.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
build.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
crack.exe
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
crack.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral7
Sample
map.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
map.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral9
Sample
spoof/roblox not opening, read this!.rtf
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
spoof/roblox not opening, read this!.rtf
Resource
win10v2004-20240221-en
Behavioral task
behavioral11
Sample
spoof/spoof.exe
Resource
win7-20240215-en
Behavioral task
behavioral12
Sample
spoof/spoof.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral13
Sample
v2/auth/authenticator.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
v2/auth/authenticator.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral15
Sample
v2/auth/runtime.dll
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
v2/auth/runtime.dll
Resource
win10v2004-20240221-en
General
-
Target
crack.exe
-
Size
3.4MB
-
MD5
a827295f4df3c5ba4eae2c68b555ab18
-
SHA1
04a24b11e1eaa40d221ae960160dfb4bd39effbd
-
SHA256
f801b0b197f0b4b3244441aa7428acf34c2a034201a00d8d4d8eab0d3b647908
-
SHA512
8a53a730bc1bd78b1f108fe1e22d03dbb9f6802092ec31291befedcac7016b3ddc37206b2fca72dafc20d4cb83c5fd68d39cb38f6b69c18a4df10285e6dfc1d0
-
SSDEEP
49152:S6D0LjBn8/PkyiZYq6cVERznwOnqswS/KtJ78JEmm8PKXnqrADkMT0IZdC:y/VeJwYUQXqpAVmmm8PwntT0IZdC
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe 3672 crack.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3672 wrote to memory of 4192 3672 crack.exe 88 PID 3672 wrote to memory of 4192 3672 crack.exe 88 PID 4192 wrote to memory of 2260 4192 cmd.exe 89 PID 4192 wrote to memory of 2260 4192 cmd.exe 89 PID 3672 wrote to memory of 4796 3672 crack.exe 90 PID 3672 wrote to memory of 4796 3672 crack.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\crack.exe"C:\Users\Admin\AppData\Local\Temp\crack.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start CompPkgSrv.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\system32\CompPkgSrv.exeCompPkgSrv.exe3⤵PID:2260
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c pause2⤵PID:4796
-