Overview
overview
10Static
static
10MIXED CRAC...OT.exe
windows10-ltsc 2021-x64
3MIXED CRAC...ws.dll
windows10-ltsc 2021-x64
3MIXED CRAC...sd.dll
windows10-ltsc 2021-x64
3MIXED CRAC....0.exe
windows10-ltsc 2021-x64
7MIXED CRAC...on.dll
windows10-ltsc 2021-x64
1MIXED CRAC...on.dll
windows10-ltsc 2021-x64
1MIXED CRAC...or.exe
windows10-ltsc 2021-x64
7MIXED CRAC...st.exe
windows10-ltsc 2021-x64
1MIXED CRAC...ol.exe
windows10-ltsc 2021-x64
3MIXED CRAC...32.dll
windows10-ltsc 2021-x64
3MIXED CRAC...32.dll
windows10-ltsc 2021-x64
3MIXED CRAC...on.exe
windows10-ltsc 2021-x64
7MIXED CRAC...gn.dll
windows10-ltsc 2021-x64
1MIXED CRAC...ts.dll
windows10-ltsc 2021-x64
1MIXED CRAC...rk.dll
windows10-ltsc 2021-x64
1MIXED CRAC...gn.dll
windows10-ltsc 2021-x64
1MIXED CRAC...ts.dll
windows10-ltsc 2021-x64
1MIXED CRAC...rk.dll
windows10-ltsc 2021-x64
1MIXED CRAC...or.exe
windows10-ltsc 2021-x64
7MIXED CRAC...st.exe
windows10-ltsc 2021-x64
1MIXED CRAC...mt.exe
windows10-ltsc 2021-x64
3MIXED CRAC...er.exe
windows10-ltsc 2021-x64
7MIXED CRAC...on.vbs
windows10-ltsc 2021-x64
1MIXED CRAC...ch.vbs
windows10-ltsc 2021-x64
1MIXED CRAC...rc.vbs
windows10-ltsc 2021-x64
1MIXED CRAC...ed.vbs
windows10-ltsc 2021-x64
1MIXED CRAC...dy.vbs
windows10-ltsc 2021-x64
1MIXED CRAC...ch.vbs
windows10-ltsc 2021-x64
1MIXED CRAC...er.dll
windows10-ltsc 2021-x64
1MIXED CRAC...it.dll
windows10-ltsc 2021-x64
1MIXED CRAC...or.exe
windows10-ltsc 2021-x64
7MIXED CRAC...st.exe
windows10-ltsc 2021-x64
1Analysis
-
max time kernel
148s -
max time network
160s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
17-11-2024 15:40
Behavioral task
behavioral1
Sample
MIXED CRACKING PACK #2/CryptoTrader BOT - FINAL Cracked by ap3x/commands/sysBOT.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
MIXED CRACKING PACK #2/Dork Combiner v1.2 by Volevanya/platforms/qwindows.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
MIXED CRACKING PACK #2/Dork Combiner v1.2 by Volevanya/platforms/qwindowsd.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
MIXED CRACKING PACK #2/DorkToolsV.5.0/Dorktools V.5.0.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral5
Sample
MIXED CRACKING PACK #2/DorkToolsV.5.0/IronPython.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral6
Sample
MIXED CRACKING PACK #2/DorkToolsV.5.0/ToolPortal/IronPython.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral7
Sample
MIXED CRACKING PACK #2/DorkToolsV.5.0/ToolPortal/Microsoft Windows Protocol Monitor.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral8
Sample
MIXED CRACKING PACK #2/DorkToolsV.5.0/ToolPortal/Microsoft Windows Protocol Services Host.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral9
Sample
MIXED CRACKING PACK #2/DorkToolsV.5.0/ToolPortal/SoftTool.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral10
Sample
MIXED CRACKING PACK #2/DorkToolsV.5.0/ToolPortal/msacm32.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral11
Sample
MIXED CRACKING PACK #2/DorkToolsV.5.0/msacm32.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral12
Sample
MIXED CRACKING PACK #2/Dorker Gorker/Gorker Private - Black Edition.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral13
Sample
MIXED CRACKING PACK #2/Dorker Gorker/MetroFramework.Design.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral14
Sample
MIXED CRACKING PACK #2/Dorker Gorker/MetroFramework.Fonts.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral15
Sample
MIXED CRACKING PACK #2/Dorker Gorker/MetroFramework.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral16
Sample
MIXED CRACKING PACK #2/Dorker Gorker/xNet/MetroFramework.Design.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral17
Sample
MIXED CRACKING PACK #2/Dorker Gorker/xNet/MetroFramework.Fonts.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral18
Sample
MIXED CRACKING PACK #2/Dorker Gorker/xNet/MetroFramework.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral19
Sample
MIXED CRACKING PACK #2/Dorker Gorker/xNet/Microsoft Windows Protocol Monitor.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral20
Sample
MIXED CRACKING PACK #2/Dorker Gorker/xNet/Microsoft Windows Protocol Services Host.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral21
Sample
MIXED CRACKING PACK #2/Dorker Gorker/xNet/xmt.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral22
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/Dr. VBS Virus Maker.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral23
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/Sources/Antideletion.vbs
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral24
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/Sources/Infectfiles-Search.vbs
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral25
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/Sources/Mirc.vbs
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral26
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/Sources/Outlook-Attached.vbs
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral27
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/Sources/Outlook-InBody.vbs
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral28
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/Sources/Pirch.vbs
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral29
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/WebDriver.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral30
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/Xceed.Wpf.Toolkit.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral31
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/data/Microsoft Windows Protocol Monitor.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral32
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/data/Microsoft Windows Protocol Services Host.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
MIXED CRACKING PACK #2/DorkToolsV.5.0/Dorktools V.5.0.exe
-
Size
13KB
-
MD5
2fb0cc4af28b1fb154347d47ce7d21a4
-
SHA1
362761152900280491048e8a3cae989816c2d1e8
-
SHA256
6c435e61dfb2bdb9a5b3b6fbabeefbd67d724ff489e40ebf48376dcc93fe3bfb
-
SHA512
c1dff7bd3788462cdecd8d31ecf5966a9b9e748346e45428d64c344dbb6f91abd58127e889f7b39a63f92fa853b1f51cff30bcba9d4084d0ddbe0f2810623c21
-
SSDEEP
384:/yGoLg80y1ngUb3c/NTsRAYvcXntVUi5fvPS:eg8cUbNAWe7U86
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Dorktools V.5.0.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1361837696-2276465416-1936241636-1000\Control Panel\International\Geo\Nation Dorktools V.5.0.exe -
Drops startup file 1 IoCs
Processes:
Dorktools V.5.0.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Startup.lnk Dorktools V.5.0.exe -
Executes dropped EXE 1 IoCs
Processes:
Microsoft Windows Protocol Services Host.exepid process 4584 Microsoft Windows Protocol Services Host.exe -
Drops file in Windows directory 2 IoCs
Processes:
Dorktools V.5.0.exedescription ioc process File created C:\Windows\Program Files (x86)\Microsoft Host Interface\ToolPortal\Microsoft Windows Protocol Services Host.exe Dorktools V.5.0.exe File created C:\Windows\Program Files (x86)\Microsoft Host Interface\ToolPortal\Microsoft Windows Protocol Monitor.exe Dorktools V.5.0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Dorktools V.5.0.exeSoftTool.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dorktools V.5.0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SoftTool.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
Microsoft Windows Protocol Services Host.exepid process 4584 Microsoft Windows Protocol Services Host.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
SoftTool.exepid process 5156 SoftTool.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
Dorktools V.5.0.exedescription pid process target process PID 3152 wrote to memory of 4584 3152 Dorktools V.5.0.exe Microsoft Windows Protocol Services Host.exe PID 3152 wrote to memory of 4584 3152 Dorktools V.5.0.exe Microsoft Windows Protocol Services Host.exe PID 3152 wrote to memory of 5156 3152 Dorktools V.5.0.exe SoftTool.exe PID 3152 wrote to memory of 5156 3152 Dorktools V.5.0.exe SoftTool.exe PID 3152 wrote to memory of 5156 3152 Dorktools V.5.0.exe SoftTool.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\MIXED CRACKING PACK #2\DorkToolsV.5.0\Dorktools V.5.0.exe"C:\Users\Admin\AppData\Local\Temp\MIXED CRACKING PACK #2\DorkToolsV.5.0\Dorktools V.5.0.exe"1⤵
- Checks computer location settings
- Drops startup file
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\Program Files (x86)\Microsoft Host Interface\ToolPortal\Microsoft Windows Protocol Services Host.exe"C:\Windows\Program Files (x86)\Microsoft Host Interface\ToolPortal\Microsoft Windows Protocol Services Host.exe" {Arguments If Needed}2⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
PID:4584
-
-
C:\Users\Admin\AppData\Local\Temp\MIXED CRACKING PACK #2\DorkToolsV.5.0\ToolPortal\SoftTool.exe"C:\Users\Admin\AppData\Local\Temp\MIXED CRACKING PACK #2\DorkToolsV.5.0\ToolPortal\SoftTool.exe" {Arguments If Needed}2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\Program Files (x86)\Microsoft Host Interface\ToolPortal\Microsoft Windows Protocol Services Host.exe
Filesize10KB
MD58f4aab2fec1a08d6ca733d88462e75ee
SHA13660982b5bc9b54f7c7a96fe905c2861e5e9c624
SHA256eea3e94b837225ea82492c61f4b1aaead7654d59ad948a28af3b66e370d473e6
SHA512243157e09cb2aec487b0300718d12211b0311a6d31a001e9839dea21718cd103e27c85e229a10a5e371bb2afee1087a53b3fa8bcd7382291c354a16ed3510ea8