Analysis

  • max time kernel
    134s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/06/2024, 21:55

General

  • Target

    aquatic/crack.dll

  • Size

    5.1MB

  • MD5

    fe7dc4218e47f5c31e7a2db9b2e55ddd

  • SHA1

    6d30688097e87755b5d59429e5dfb9ce0562f931

  • SHA256

    1cbaa9f954edae2e9a6ccac8e0119ff533ee01b42b1bb24fa10adfa80064b780

  • SHA512

    922048e800411cb7f21618647b88b0d8b5c98aa45a55eb8ab66a838f3900bed6e03cd247e27af0b304bd4b71fa6402d1b88aa320aa4c23a42088a1617dac73c7

  • SSDEEP

    98304:ZvNYCYPKFV3CIz5igBo6qO90Pqp8YVH/6yG/fdmjLdGGf:ZvyWLNia90S7iyb

Score
9/10

Malware Config

Signatures

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\aquatic\crack.dll,#1
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks whether UAC is enabled
    PID:748
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4148,i,6041070687820623968,3004230300437737550,262144 --variations-seed-version --mojo-platform-channel-handle=1984 /prefetch:8
    1⤵
      PID:5104

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/748-1-0x00000000692F0000-0x0000000069CE4000-memory.dmp

            Filesize

            10.0MB

          • memory/748-2-0x00000000692F0000-0x0000000069CE4000-memory.dmp

            Filesize

            10.0MB

          • memory/748-3-0x00000000692F0000-0x0000000069CE4000-memory.dmp

            Filesize

            10.0MB

          • memory/748-4-0x00000000692F0000-0x0000000069CE4000-memory.dmp

            Filesize

            10.0MB

          • memory/748-5-0x00000000692F0000-0x0000000069CE4000-memory.dmp

            Filesize

            10.0MB

          • memory/748-0-0x00000000692F0000-0x0000000069CE4000-memory.dmp

            Filesize

            10.0MB

          • memory/748-6-0x00000000692F0000-0x0000000069CE4000-memory.dmp

            Filesize

            10.0MB

          • memory/748-7-0x00000000692F0000-0x0000000069CE4000-memory.dmp

            Filesize

            10.0MB