Overview
overview
9Static
static
7Verse crac...or.exe
windows7-x64
1Verse crac...or.exe
windows10-2004-x64
1Verse crac...RU.exe
windows7-x64
1Verse crac...RU.exe
windows10-2004-x64
1Verse crac...ll.exe
windows7-x64
1Verse crac...ll.exe
windows10-2004-x64
1Verse crac...rt.exe
windows7-x64
4Verse crac...rt.exe
windows10-2004-x64
5Verse crac...64.exe
windows7-x64
4Verse crac...64.exe
windows10-2004-x64
5Verse crac...er.bat
windows7-x64
1Verse crac...er.bat
windows10-2004-x64
1Verse crac...er.exe
windows7-x64
9Verse crac...er.exe
windows10-2004-x64
9Verse crac...er.exe
windows7-x64
7Verse crac...er.exe
windows10-2004-x64
7Verse crac...n].bat
windows7-x64
1Verse crac...n].bat
windows10-2004-x64
1Verse crac...15.exe
windows7-x64
9Verse crac...15.exe
windows10-2004-x64
9Verse crac...ip.dll
windows7-x64
1Verse crac...ip.dll
windows10-2004-x64
1Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
20-04-2024 03:30
Behavioral task
behavioral1
Sample
Verse crack from feds and nex/Injector.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Verse crack from feds and nex/Injector.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
Verse crack from feds and nex/Monitor Spoof/CRU.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Verse crack from feds and nex/Monitor Spoof/CRU.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
Verse crack from feds and nex/Monitor Spoof/reset-all.exe
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
Verse crack from feds and nex/Monitor Spoof/reset-all.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
Verse crack from feds and nex/Monitor Spoof/restart.exe
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
Verse crack from feds and nex/Monitor Spoof/restart.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
Verse crack from feds and nex/Monitor Spoof/restart64.exe
Resource
win7-20240220-en
Behavioral task
behavioral10
Sample
Verse crack from feds and nex/Monitor Spoof/restart64.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
Verse crack from feds and nex/Serialcheckers/Backup serialchecker/Serialchecker.bat
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
Verse crack from feds and nex/Serialcheckers/Backup serialchecker/Serialchecker.bat
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
Verse crack from feds and nex/Serialcheckers/Mac-checker.exe
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
Verse crack from feds and nex/Serialcheckers/Mac-checker.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
Verse crack from feds and nex/Serialcheckers/Serialchecker.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
Verse crack from feds and nex/Serialcheckers/Serialchecker.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
Verse crack from feds and nex/Serialcheckers/Wifi & Bluetooth disabler/Disabler [Run Admin].bat
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
Verse crack from feds and nex/Serialcheckers/Wifi & Bluetooth disabler/Disabler [Run Admin].bat
Resource
win10v2004-20240412-en
Behavioral task
behavioral19
Sample
Verse crack from feds and nex/Verse V4.15.exe
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
Verse crack from feds and nex/Verse V4.15.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral21
Sample
Verse crack from feds and nex/rip.dll
Resource
win7-20240215-en
Behavioral task
behavioral22
Sample
Verse crack from feds and nex/rip.dll
Resource
win10v2004-20240226-en
General
-
Target
Verse crack from feds and nex/Injector.exe
-
Size
38KB
-
MD5
a19948457af73fe0f3c49b49badf6abd
-
SHA1
4ea1c82444ba61bcb7dfa189acbfc80847fe42da
-
SHA256
3b6136a46763fc80aa5e6bcffd52023ec36678bc9d2dbf87f1f8527861a67a86
-
SHA512
d035be1546ae86a33aaf682dfa20aa35d3d5ea350e11ef61849e4ec03d63673e1726b18b3f9abfa8e7b4d4d76cca45411bf106bb6425c2da048601ccaf2848f0
-
SSDEEP
768:agK4Vns9VKClWwy0pGtqXnF/PME2+0nhMkTdhKVlD7+ZsRID6+:agWLKCl9yYW5TikTdQVlD7JID
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Injector.exedescription pid process Token: 0 2064 Injector.exe