Analysis
-
max time kernel
18s -
max time network
13s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2024 20:45
Static task
static1
Behavioral task
behavioral1
Sample
Etheral Private cracked_Kali.exe
Resource
win10v2004-20240802-en
General
-
Target
Etheral Private cracked_Kali.exe
-
Size
2.8MB
-
MD5
b9d454512d56e4a373ac676390202d55
-
SHA1
ce4a595f4cc1e07a8b0db0f54f68e7b7dae1c8f5
-
SHA256
fad7dda2a454d54436b32e4baf5856cf0e6f15d5abe3eedb71e51a01c466405a
-
SHA512
55055cce42fd8c751e11470a2e61ad657c2e393cc611883b0361d6f4c896283c682b0d5f2292bf7d52b8d3bb3f153af09327554cd19dc76454aba75f063ef576
-
SSDEEP
24576:NifzMZkZzWXORiyDkH4BmUB9nlRvuGKFmLmyzD+7hoe+l3lhMdAvW4C30Wemex26:mekb9Bbn1Soe+lK5rF/iJ
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\IALhmrlKnLJcSptJgPWHQSrfsadT\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\IALhmrlKnLJcSptJgPWHQSrfsadT" mp.exe -
Executes dropped EXE 1 IoCs
pid Process 2616 mp.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2616 mp.exe 2616 mp.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2616 mp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 2616 mp.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 4444 wrote to memory of 3592 4444 Etheral Private cracked_Kali.exe 86 PID 4444 wrote to memory of 3592 4444 Etheral Private cracked_Kali.exe 86 PID 4444 wrote to memory of 2444 4444 Etheral Private cracked_Kali.exe 87 PID 4444 wrote to memory of 2444 4444 Etheral Private cracked_Kali.exe 87 PID 2444 wrote to memory of 832 2444 cmd.exe 88 PID 2444 wrote to memory of 832 2444 cmd.exe 88 PID 2444 wrote to memory of 224 2444 cmd.exe 89 PID 2444 wrote to memory of 224 2444 cmd.exe 89 PID 2444 wrote to memory of 1860 2444 cmd.exe 90 PID 2444 wrote to memory of 1860 2444 cmd.exe 90 PID 4444 wrote to memory of 4924 4444 Etheral Private cracked_Kali.exe 94 PID 4444 wrote to memory of 4924 4444 Etheral Private cracked_Kali.exe 94 PID 4924 wrote to memory of 3984 4924 cmd.exe 95 PID 4924 wrote to memory of 3984 4924 cmd.exe 95 PID 4924 wrote to memory of 1276 4924 cmd.exe 96 PID 4924 wrote to memory of 1276 4924 cmd.exe 96 PID 4924 wrote to memory of 4484 4924 cmd.exe 97 PID 4924 wrote to memory of 4484 4924 cmd.exe 97 PID 4444 wrote to memory of 4996 4444 Etheral Private cracked_Kali.exe 104 PID 4444 wrote to memory of 4996 4444 Etheral Private cracked_Kali.exe 104 PID 4444 wrote to memory of 3116 4444 Etheral Private cracked_Kali.exe 105 PID 4444 wrote to memory of 3116 4444 Etheral Private cracked_Kali.exe 105 PID 3116 wrote to memory of 2616 3116 cmd.exe 106 PID 3116 wrote to memory of 2616 3116 cmd.exe 106 PID 4444 wrote to memory of 1272 4444 Etheral Private cracked_Kali.exe 109 PID 4444 wrote to memory of 1272 4444 Etheral Private cracked_Kali.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\Etheral Private cracked_Kali.exe"C:\Users\Admin\AppData\Local\Temp\Etheral Private cracked_Kali.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c color 0b2⤵PID:3592
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Etheral Private cracked_Kali.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Etheral Private cracked_Kali.exe" MD53⤵PID:832
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:224
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:1860
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c certutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Etheral Private cracked_Kali.exe" MD5 | find /i /v "md5" | find /i /v "certutil"2⤵
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\system32\certutil.execertutil -hashfile "C:\Users\Admin\AppData\Local\Temp\Etheral Private cracked_Kali.exe" MD53⤵PID:3984
-
-
C:\Windows\system32\find.exefind /i /v "md5"3⤵PID:1276
-
-
C:\Windows\system32\find.exefind /i /v "certutil"3⤵PID:4484
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4996
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\mp.exe C:\Users\dr.sys2⤵
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Users\mp.exeC:\Users\mp.exe C:\Users\dr.sys3⤵
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:1272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
530KB
MD537be44c7e6a3adbe4cae43da42996d2b
SHA150599b2f8a255afe2b48079bbadf24bed4d0e513
SHA256914fa2b0c09fd2fa535378bebcc7faf2b6093ed6a70d9215896620d6b55f7593
SHA5123f9dab0ac49dd94578e63e1619a7f17a37967c1a9d569629581c5ca461224d6ac38f9ef54a7be8aacece9669c1746a811916edf8fdc759d653a43e9e36920fba
-
Filesize
915KB
MD54b2287f71f2ecff41b8a8c9b67cf4b26
SHA182902a45fe76625de77528a82b165d57bf190613
SHA2566c7ad0ffc2045a1050313ce327e4993e2bd4d6749a819440c352e501af097970
SHA512d96ba4a52d45d3f844da4e5da1e94941aa0cee095ef4ca423e445d48cef5187f55518e3653beed1ee879e1aec61d4bf53eabc70d68737bb7d7579db229481861