Overview
overview
10Static
static
10MIXED CRAC...OT.exe
windows10-ltsc 2021-x64
3MIXED CRAC...ws.dll
windows10-ltsc 2021-x64
3MIXED CRAC...sd.dll
windows10-ltsc 2021-x64
3MIXED CRAC....0.exe
windows10-ltsc 2021-x64
7MIXED CRAC...on.dll
windows10-ltsc 2021-x64
1MIXED CRAC...on.dll
windows10-ltsc 2021-x64
1MIXED CRAC...or.exe
windows10-ltsc 2021-x64
7MIXED CRAC...st.exe
windows10-ltsc 2021-x64
1MIXED CRAC...ol.exe
windows10-ltsc 2021-x64
3MIXED CRAC...32.dll
windows10-ltsc 2021-x64
3MIXED CRAC...32.dll
windows10-ltsc 2021-x64
3MIXED CRAC...on.exe
windows10-ltsc 2021-x64
7MIXED CRAC...gn.dll
windows10-ltsc 2021-x64
1MIXED CRAC...ts.dll
windows10-ltsc 2021-x64
1MIXED CRAC...rk.dll
windows10-ltsc 2021-x64
1MIXED CRAC...gn.dll
windows10-ltsc 2021-x64
1MIXED CRAC...ts.dll
windows10-ltsc 2021-x64
1MIXED CRAC...rk.dll
windows10-ltsc 2021-x64
1MIXED CRAC...or.exe
windows10-ltsc 2021-x64
7MIXED CRAC...st.exe
windows10-ltsc 2021-x64
1MIXED CRAC...mt.exe
windows10-ltsc 2021-x64
3MIXED CRAC...er.exe
windows10-ltsc 2021-x64
7MIXED CRAC...on.vbs
windows10-ltsc 2021-x64
1MIXED CRAC...ch.vbs
windows10-ltsc 2021-x64
1MIXED CRAC...rc.vbs
windows10-ltsc 2021-x64
1MIXED CRAC...ed.vbs
windows10-ltsc 2021-x64
1MIXED CRAC...dy.vbs
windows10-ltsc 2021-x64
1MIXED CRAC...ch.vbs
windows10-ltsc 2021-x64
1MIXED CRAC...er.dll
windows10-ltsc 2021-x64
1MIXED CRAC...it.dll
windows10-ltsc 2021-x64
1MIXED CRAC...or.exe
windows10-ltsc 2021-x64
7MIXED CRAC...st.exe
windows10-ltsc 2021-x64
1Analysis
-
max time kernel
148s -
max time network
143s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
17-11-2024 15:40
Behavioral task
behavioral1
Sample
MIXED CRACKING PACK #2/CryptoTrader BOT - FINAL Cracked by ap3x/commands/sysBOT.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
MIXED CRACKING PACK #2/Dork Combiner v1.2 by Volevanya/platforms/qwindows.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
MIXED CRACKING PACK #2/Dork Combiner v1.2 by Volevanya/platforms/qwindowsd.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
MIXED CRACKING PACK #2/DorkToolsV.5.0/Dorktools V.5.0.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral5
Sample
MIXED CRACKING PACK #2/DorkToolsV.5.0/IronPython.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral6
Sample
MIXED CRACKING PACK #2/DorkToolsV.5.0/ToolPortal/IronPython.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral7
Sample
MIXED CRACKING PACK #2/DorkToolsV.5.0/ToolPortal/Microsoft Windows Protocol Monitor.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral8
Sample
MIXED CRACKING PACK #2/DorkToolsV.5.0/ToolPortal/Microsoft Windows Protocol Services Host.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral9
Sample
MIXED CRACKING PACK #2/DorkToolsV.5.0/ToolPortal/SoftTool.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral10
Sample
MIXED CRACKING PACK #2/DorkToolsV.5.0/ToolPortal/msacm32.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral11
Sample
MIXED CRACKING PACK #2/DorkToolsV.5.0/msacm32.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral12
Sample
MIXED CRACKING PACK #2/Dorker Gorker/Gorker Private - Black Edition.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral13
Sample
MIXED CRACKING PACK #2/Dorker Gorker/MetroFramework.Design.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral14
Sample
MIXED CRACKING PACK #2/Dorker Gorker/MetroFramework.Fonts.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral15
Sample
MIXED CRACKING PACK #2/Dorker Gorker/MetroFramework.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral16
Sample
MIXED CRACKING PACK #2/Dorker Gorker/xNet/MetroFramework.Design.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral17
Sample
MIXED CRACKING PACK #2/Dorker Gorker/xNet/MetroFramework.Fonts.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral18
Sample
MIXED CRACKING PACK #2/Dorker Gorker/xNet/MetroFramework.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral19
Sample
MIXED CRACKING PACK #2/Dorker Gorker/xNet/Microsoft Windows Protocol Monitor.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral20
Sample
MIXED CRACKING PACK #2/Dorker Gorker/xNet/Microsoft Windows Protocol Services Host.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral21
Sample
MIXED CRACKING PACK #2/Dorker Gorker/xNet/xmt.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral22
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/Dr. VBS Virus Maker.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral23
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/Sources/Antideletion.vbs
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral24
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/Sources/Infectfiles-Search.vbs
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral25
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/Sources/Mirc.vbs
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral26
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/Sources/Outlook-Attached.vbs
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral27
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/Sources/Outlook-InBody.vbs
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral28
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/Sources/Pirch.vbs
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral29
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/WebDriver.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral30
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/Xceed.Wpf.Toolkit.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral31
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/data/Microsoft Windows Protocol Monitor.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral32
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/data/Microsoft Windows Protocol Services Host.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
MIXED CRACKING PACK #2/Dorker Gorker/Gorker Private - Black Edition.exe
-
Size
182KB
-
MD5
2da27a803c92f41655d3fff2bb72c7a5
-
SHA1
e9df69dd0bcf05817a998fd11a597429e8a0dd55
-
SHA256
28478badd35fe47b3dd1b491b55b14a62cf94035fbb63ba898ae2ae7963a4a8f
-
SHA512
e9f612537ac7997cbc888d33f38026565233ae5e9d26bb394eacbfc044226f37eedf69a8f624410477386e07d05880afcb66c670c40f76c461db36a1bd37006f
-
SSDEEP
768:mMg8nUbNAiREUfmb7uu7TOWq7C7HT8ofXxv3/NDsMYzCSxxR6:9gnbpAusTkCH3fXl3p6LPR6
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-641261377-2215826147-608237349-1000\Control Panel\International\Geo\Nation Gorker Private - Black Edition.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Startup.lnk Gorker Private - Black Edition.exe -
Executes dropped EXE 1 IoCs
pid Process 5996 Microsoft Windows Protocol Services Host.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Program Files (x86)\Microsoft Host Interface\xNet\Microsoft Windows Protocol Monitor.exe Gorker Private - Black Edition.exe File created C:\Windows\Program Files (x86)\Microsoft Host Interface\xNet\Microsoft Windows Protocol Services Host.exe Gorker Private - Black Edition.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gorker Private - Black Edition.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xmt.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 5996 Microsoft Windows Protocol Services Host.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 5348 wrote to memory of 5996 5348 Gorker Private - Black Edition.exe 87 PID 5348 wrote to memory of 5996 5348 Gorker Private - Black Edition.exe 87 PID 5348 wrote to memory of 5228 5348 Gorker Private - Black Edition.exe 88 PID 5348 wrote to memory of 5228 5348 Gorker Private - Black Edition.exe 88 PID 5348 wrote to memory of 5228 5348 Gorker Private - Black Edition.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\MIXED CRACKING PACK #2\Dorker Gorker\Gorker Private - Black Edition.exe"C:\Users\Admin\AppData\Local\Temp\MIXED CRACKING PACK #2\Dorker Gorker\Gorker Private - Black Edition.exe"1⤵
- Checks computer location settings
- Drops startup file
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5348 -
C:\Windows\Program Files (x86)\Microsoft Host Interface\xNet\Microsoft Windows Protocol Services Host.exe"C:\Windows\Program Files (x86)\Microsoft Host Interface\xNet\Microsoft Windows Protocol Services Host.exe" {Arguments If Needed}2⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
PID:5996
-
-
C:\Users\Admin\AppData\Local\Temp\MIXED CRACKING PACK #2\Dorker Gorker\xNet\xmt.exe"C:\Users\Admin\AppData\Local\Temp\MIXED CRACKING PACK #2\Dorker Gorker\xNet\xmt.exe" {Arguments If Needed}2⤵
- System Location Discovery: System Language Discovery
PID:5228
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\Program Files (x86)\Microsoft Host Interface\xNet\Microsoft Windows Protocol Services Host.exe
Filesize10KB
MD58f4aab2fec1a08d6ca733d88462e75ee
SHA13660982b5bc9b54f7c7a96fe905c2861e5e9c624
SHA256eea3e94b837225ea82492c61f4b1aaead7654d59ad948a28af3b66e370d473e6
SHA512243157e09cb2aec487b0300718d12211b0311a6d31a001e9839dea21718cd103e27c85e229a10a5e371bb2afee1087a53b3fa8bcd7382291c354a16ed3510ea8