Overview
overview
10Static
static
10MIXED CRAC...OT.exe
windows10-ltsc 2021-x64
3MIXED CRAC...ws.dll
windows10-ltsc 2021-x64
3MIXED CRAC...sd.dll
windows10-ltsc 2021-x64
3MIXED CRAC....0.exe
windows10-ltsc 2021-x64
7MIXED CRAC...on.dll
windows10-ltsc 2021-x64
1MIXED CRAC...on.dll
windows10-ltsc 2021-x64
1MIXED CRAC...or.exe
windows10-ltsc 2021-x64
7MIXED CRAC...st.exe
windows10-ltsc 2021-x64
1MIXED CRAC...ol.exe
windows10-ltsc 2021-x64
3MIXED CRAC...32.dll
windows10-ltsc 2021-x64
3MIXED CRAC...32.dll
windows10-ltsc 2021-x64
3MIXED CRAC...on.exe
windows10-ltsc 2021-x64
7MIXED CRAC...gn.dll
windows10-ltsc 2021-x64
1MIXED CRAC...ts.dll
windows10-ltsc 2021-x64
1MIXED CRAC...rk.dll
windows10-ltsc 2021-x64
1MIXED CRAC...gn.dll
windows10-ltsc 2021-x64
1MIXED CRAC...ts.dll
windows10-ltsc 2021-x64
1MIXED CRAC...rk.dll
windows10-ltsc 2021-x64
1MIXED CRAC...or.exe
windows10-ltsc 2021-x64
7MIXED CRAC...st.exe
windows10-ltsc 2021-x64
1MIXED CRAC...mt.exe
windows10-ltsc 2021-x64
3MIXED CRAC...er.exe
windows10-ltsc 2021-x64
7MIXED CRAC...on.vbs
windows10-ltsc 2021-x64
1MIXED CRAC...ch.vbs
windows10-ltsc 2021-x64
1MIXED CRAC...rc.vbs
windows10-ltsc 2021-x64
1MIXED CRAC...ed.vbs
windows10-ltsc 2021-x64
1MIXED CRAC...dy.vbs
windows10-ltsc 2021-x64
1MIXED CRAC...ch.vbs
windows10-ltsc 2021-x64
1MIXED CRAC...er.dll
windows10-ltsc 2021-x64
1MIXED CRAC...it.dll
windows10-ltsc 2021-x64
1MIXED CRAC...or.exe
windows10-ltsc 2021-x64
7MIXED CRAC...st.exe
windows10-ltsc 2021-x64
1Analysis
-
max time kernel
150s -
max time network
162s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
17-11-2024 15:40
Behavioral task
behavioral1
Sample
MIXED CRACKING PACK #2/CryptoTrader BOT - FINAL Cracked by ap3x/commands/sysBOT.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
MIXED CRACKING PACK #2/Dork Combiner v1.2 by Volevanya/platforms/qwindows.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
MIXED CRACKING PACK #2/Dork Combiner v1.2 by Volevanya/platforms/qwindowsd.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
MIXED CRACKING PACK #2/DorkToolsV.5.0/Dorktools V.5.0.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral5
Sample
MIXED CRACKING PACK #2/DorkToolsV.5.0/IronPython.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral6
Sample
MIXED CRACKING PACK #2/DorkToolsV.5.0/ToolPortal/IronPython.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral7
Sample
MIXED CRACKING PACK #2/DorkToolsV.5.0/ToolPortal/Microsoft Windows Protocol Monitor.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral8
Sample
MIXED CRACKING PACK #2/DorkToolsV.5.0/ToolPortal/Microsoft Windows Protocol Services Host.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral9
Sample
MIXED CRACKING PACK #2/DorkToolsV.5.0/ToolPortal/SoftTool.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral10
Sample
MIXED CRACKING PACK #2/DorkToolsV.5.0/ToolPortal/msacm32.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral11
Sample
MIXED CRACKING PACK #2/DorkToolsV.5.0/msacm32.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral12
Sample
MIXED CRACKING PACK #2/Dorker Gorker/Gorker Private - Black Edition.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral13
Sample
MIXED CRACKING PACK #2/Dorker Gorker/MetroFramework.Design.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral14
Sample
MIXED CRACKING PACK #2/Dorker Gorker/MetroFramework.Fonts.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral15
Sample
MIXED CRACKING PACK #2/Dorker Gorker/MetroFramework.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral16
Sample
MIXED CRACKING PACK #2/Dorker Gorker/xNet/MetroFramework.Design.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral17
Sample
MIXED CRACKING PACK #2/Dorker Gorker/xNet/MetroFramework.Fonts.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral18
Sample
MIXED CRACKING PACK #2/Dorker Gorker/xNet/MetroFramework.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral19
Sample
MIXED CRACKING PACK #2/Dorker Gorker/xNet/Microsoft Windows Protocol Monitor.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral20
Sample
MIXED CRACKING PACK #2/Dorker Gorker/xNet/Microsoft Windows Protocol Services Host.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral21
Sample
MIXED CRACKING PACK #2/Dorker Gorker/xNet/xmt.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral22
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/Dr. VBS Virus Maker.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral23
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/Sources/Antideletion.vbs
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral24
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/Sources/Infectfiles-Search.vbs
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral25
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/Sources/Mirc.vbs
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral26
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/Sources/Outlook-Attached.vbs
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral27
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/Sources/Outlook-InBody.vbs
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral28
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/Sources/Pirch.vbs
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral29
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/WebDriver.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral30
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/Xceed.Wpf.Toolkit.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral31
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/data/Microsoft Windows Protocol Monitor.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral32
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/data/Microsoft Windows Protocol Services Host.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/Dr. VBS Virus Maker.exe
-
Size
179KB
-
MD5
87db74e604f56ea66769aa3c73adcc8c
-
SHA1
b1ba6dca95c3680140c2280095d20f277f06212d
-
SHA256
b92c4d6a2dbc733b4fad7c9481a7091dd01666ad782ba9405bccf45dbf1ad520
-
SHA512
cfc0ccf7419d695ede9c87cf52bc2688f8e89bd82f1390556b05c7bea31cd7d71fe3c42a397b63771462a78a43c1cfc808dd5d1d71adcb61cd5194c4c26548fb
-
SSDEEP
768:1Mg8nUbNAi/AUDz1skK87Bg2grrmdAqTUeUfeb0dy6:GgnbTDz1skK88rrgAEZweb0U6
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Dr. VBS Virus Maker.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation Dr. VBS Virus Maker.exe -
Drops startup file 1 IoCs
Processes:
Dr. VBS Virus Maker.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Startup.lnk Dr. VBS Virus Maker.exe -
Executes dropped EXE 1 IoCs
Processes:
Microsoft Windows Protocol Services Host.exepid process 1660 Microsoft Windows Protocol Services Host.exe -
Drops file in Windows directory 2 IoCs
Processes:
Dr. VBS Virus Maker.exedescription ioc process File created C:\Windows\Program Files (x86)\Microsoft Host Interface\data\Microsoft Windows Protocol Monitor.exe Dr. VBS Virus Maker.exe File created C:\Windows\Program Files (x86)\Microsoft Host Interface\data\Microsoft Windows Protocol Services Host.exe Dr. VBS Virus Maker.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Dr. VBS Virus Maker.exelib.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dr. VBS Virus Maker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lib.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
Microsoft Windows Protocol Services Host.exepid process 1660 Microsoft Windows Protocol Services Host.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
lib.exepid process 4172 lib.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
Dr. VBS Virus Maker.exedescription pid process target process PID 4248 wrote to memory of 1660 4248 Dr. VBS Virus Maker.exe Microsoft Windows Protocol Services Host.exe PID 4248 wrote to memory of 1660 4248 Dr. VBS Virus Maker.exe Microsoft Windows Protocol Services Host.exe PID 4248 wrote to memory of 4172 4248 Dr. VBS Virus Maker.exe lib.exe PID 4248 wrote to memory of 4172 4248 Dr. VBS Virus Maker.exe lib.exe PID 4248 wrote to memory of 4172 4248 Dr. VBS Virus Maker.exe lib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\MIXED CRACKING PACK #2\Dr. VBS Virus Maker\Dr. VBS Virus Maker.exe"C:\Users\Admin\AppData\Local\Temp\MIXED CRACKING PACK #2\Dr. VBS Virus Maker\Dr. VBS Virus Maker.exe"1⤵
- Checks computer location settings
- Drops startup file
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\Program Files (x86)\Microsoft Host Interface\data\Microsoft Windows Protocol Services Host.exe"C:\Windows\Program Files (x86)\Microsoft Host Interface\data\Microsoft Windows Protocol Services Host.exe" {Arguments If Needed}2⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
PID:1660
-
-
C:\Users\Admin\AppData\Local\Temp\MIXED CRACKING PACK #2\Dr. VBS Virus Maker\data\lib.exe"C:\Users\Admin\AppData\Local\Temp\MIXED CRACKING PACK #2\Dr. VBS Virus Maker\data\lib.exe" {Arguments If Needed}2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\Program Files (x86)\Microsoft Host Interface\data\Microsoft Windows Protocol Services Host.exe
Filesize10KB
MD58f4aab2fec1a08d6ca733d88462e75ee
SHA13660982b5bc9b54f7c7a96fe905c2861e5e9c624
SHA256eea3e94b837225ea82492c61f4b1aaead7654d59ad948a28af3b66e370d473e6
SHA512243157e09cb2aec487b0300718d12211b0311a6d31a001e9839dea21718cd103e27c85e229a10a5e371bb2afee1087a53b3fa8bcd7382291c354a16ed3510ea8