Analysis
-
max time kernel
1796s -
max time network
1798s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-04-2024 19:00
Static task
static1
Behavioral task
behavioral1
Sample
Crypto Wallet Cracker v2.3 cracked By @vidhayakji786.rar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Crypto Wallet Cracker v2.3 cracked By @vidhayakji786.rar
Resource
win10-20240319-en
Behavioral task
behavioral3
Sample
Crypto Wallet Cracker v2.3 cracked By @vidhayakji786.rar
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
Crypto Wallet Cracker v2.3 cracked By @vidhayakji786.rar
Resource
win11-20240214-en
General
-
Target
Crypto Wallet Cracker v2.3 cracked By @vidhayakji786.rar
-
Size
1.9MB
-
MD5
cee74f565820e90e87f26e84b6f86e3a
-
SHA1
0f9e1425e8135b5ff35d3086f5f15903dabc529f
-
SHA256
cf87f1bba6f4c6ef4c6e445f85ff57be352f6b7a72cb38d59bd30408b78c82e4
-
SHA512
6fc010446166831652b0cc77e5cbfbafed5dc518c5ce462873e9747f5606f3b732e64244dd504d0fbbe740421a017ecc4099fe8b2734bca019cd781530c793d4
-
SSDEEP
49152:Z5UoI7SGS9PzMa50xUdRo59UjSMAwjkRhNvTCRwr6m7YVpBhR7Ip:Z5644xiRobUjljrR/VXIp
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 448 Darkminer v6.exe -
Loads dropped DLL 1 IoCs
pid Process 448 Darkminer v6.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeManageVolumePrivilege 740 svchost.exe Token: SeRestorePrivilege 4516 7zFM.exe Token: 35 4516 7zFM.exe Token: SeSecurityPrivilege 4516 7zFM.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4516 7zFM.exe 4516 7zFM.exe 448 Darkminer v6.exe
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Crypto Wallet Cracker v2.3 cracked By @vidhayakji786.rar"1⤵PID:2616
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:208
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:740
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4448
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Crypto Wallet Cracker v2.3 cracked By @vidhayakji786.rar"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4516
-
C:\Users\Admin\Desktop\Darkminer v6.exe"C:\Users\Admin\Desktop\Darkminer v6.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
PID:448
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD5d80d1b6d9a6d5986fa47f6f8487030e1
SHA18f5773bf9eca43b079c1766b2e9f44cc90bd9215
SHA256446128f1712da8064d0197376184315cb529ed26ed9122f7b171bb208e22c0c3
SHA5129fcf0105c2c9ee81c526d41633d93579bb8e2837989d77fb4a6523440415ec2d7fa46ac9ae4e55ecebd99126837817ac308cc079475de02667b21727a43d74cc
-
Filesize
428B
MD5f1728a969b6df0a9da9d6c94c5015e9a
SHA1599cc4d8b5475259deca2bf4d710b11fb1237a27
SHA2564f0193049d820402b1874e80fd12f131a9d9989812fe548aa7055ae9a406dc30
SHA5128442b0626ebbf592fb0762e02f44dcb789ce256f85c83158bfbdb3e6e9ee76183340844b863c0bf9e8fa6db326840db6dd89ca4336ff2cd143ea4a485546ce48
-
Filesize
2.5MB
MD5460a1d30d612d23d859689fc4b7abc5c
SHA1feaed5566dba9e34067fff9885952a3e891c902f
SHA256654b4ebf1f7660d022dda238fcb72df9b5811c26c1e44080dc423050b7d00f67
SHA512e34a8a5e3ac4af6912300c324b530eee1dcdbb2d9b6c230b9b4e5cfdd32621537d32ccbf0e89c9a98c7b3284a2542c4df515d4a9a10f01dcf140fa653b173e2d
-
Filesize
147KB
MD5e64acd0826c046eed8b42583adb58447
SHA1fd145a3da1232e94d700f4052d4d807c2415a3c4
SHA256b8e4871c8e64009dc97aff74f987aafd0466c224a0db3744631246caba1d9453
SHA51228eb847cb02c559a8bd219a567608caac5209040ac9df778f385bdbb341cf4f93e602d2d555aa40126d077edf06286e50a3d385f8ad6c758936f96f85524354e
-
Filesize
266B
MD5d720176a229e9d969b40fabeb0baf62e
SHA1f2d8e97a6c6098a10dd80553eaaef7547ad32ba3
SHA256321b4e463bbacd6113aa337511bdebf5e7356e9971744346b28424607c7b483a
SHA5120844f9aca147014a68248c43310bf97e0a0a3679fc84650aa0a27aa09f70f56fa071c0ace1be80f0e33ce4dd3f865eae11e946d98d21af916dc1a7f945acaba0