Analysis
-
max time kernel
994s -
max time network
1600s -
platform
windows10-1703_x64 -
resource
win10-20240319-en -
resource tags
arch:x64arch:x86image:win10-20240319-enlocale:en-usos:windows10-1703-x64system -
submitted
08-04-2024 19:00
Static task
static1
Behavioral task
behavioral1
Sample
Crypto Wallet Cracker v2.3 cracked By @vidhayakji786.rar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Crypto Wallet Cracker v2.3 cracked By @vidhayakji786.rar
Resource
win10-20240319-en
Behavioral task
behavioral3
Sample
Crypto Wallet Cracker v2.3 cracked By @vidhayakji786.rar
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
Crypto Wallet Cracker v2.3 cracked By @vidhayakji786.rar
Resource
win11-20240214-en
General
-
Target
Crypto Wallet Cracker v2.3 cracked By @vidhayakji786.rar
-
Size
1.9MB
-
MD5
cee74f565820e90e87f26e84b6f86e3a
-
SHA1
0f9e1425e8135b5ff35d3086f5f15903dabc529f
-
SHA256
cf87f1bba6f4c6ef4c6e445f85ff57be352f6b7a72cb38d59bd30408b78c82e4
-
SHA512
6fc010446166831652b0cc77e5cbfbafed5dc518c5ce462873e9747f5606f3b732e64244dd504d0fbbe740421a017ecc4099fe8b2734bca019cd781530c793d4
-
SSDEEP
49152:Z5UoI7SGS9PzMa50xUdRo59UjSMAwjkRhNvTCRwr6m7YVpBhR7Ip:Z5644xiRobUjljrR/VXIp
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1240 Darkminer v6.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 4564 7zFM.exe Token: 35 4564 7zFM.exe Token: SeSecurityPrivilege 4564 7zFM.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4564 7zFM.exe 4564 7zFM.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Crypto Wallet Cracker v2.3 cracked By @vidhayakji786.rar"1⤵PID:3936
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2972
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Crypto Wallet Cracker v2.3 cracked By @vidhayakji786.rar"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4564
-
C:\Users\Admin\Desktop\Darkminer v6.exe"C:\Users\Admin\Desktop\Darkminer v6.exe"1⤵
- Executes dropped EXE
PID:1240
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
147KB
MD5e64acd0826c046eed8b42583adb58447
SHA1fd145a3da1232e94d700f4052d4d807c2415a3c4
SHA256b8e4871c8e64009dc97aff74f987aafd0466c224a0db3744631246caba1d9453
SHA51228eb847cb02c559a8bd219a567608caac5209040ac9df778f385bdbb341cf4f93e602d2d555aa40126d077edf06286e50a3d385f8ad6c758936f96f85524354e