Overview
overview
10Static
static
10MIXED CRAC...OT.exe
windows10-ltsc 2021-x64
3MIXED CRAC...ws.dll
windows10-ltsc 2021-x64
3MIXED CRAC...sd.dll
windows10-ltsc 2021-x64
3MIXED CRAC....0.exe
windows10-ltsc 2021-x64
7MIXED CRAC...on.dll
windows10-ltsc 2021-x64
1MIXED CRAC...on.dll
windows10-ltsc 2021-x64
1MIXED CRAC...or.exe
windows10-ltsc 2021-x64
7MIXED CRAC...st.exe
windows10-ltsc 2021-x64
1MIXED CRAC...ol.exe
windows10-ltsc 2021-x64
3MIXED CRAC...32.dll
windows10-ltsc 2021-x64
3MIXED CRAC...32.dll
windows10-ltsc 2021-x64
3MIXED CRAC...on.exe
windows10-ltsc 2021-x64
7MIXED CRAC...gn.dll
windows10-ltsc 2021-x64
1MIXED CRAC...ts.dll
windows10-ltsc 2021-x64
1MIXED CRAC...rk.dll
windows10-ltsc 2021-x64
1MIXED CRAC...gn.dll
windows10-ltsc 2021-x64
1MIXED CRAC...ts.dll
windows10-ltsc 2021-x64
1MIXED CRAC...rk.dll
windows10-ltsc 2021-x64
1MIXED CRAC...or.exe
windows10-ltsc 2021-x64
7MIXED CRAC...st.exe
windows10-ltsc 2021-x64
1MIXED CRAC...mt.exe
windows10-ltsc 2021-x64
3MIXED CRAC...er.exe
windows10-ltsc 2021-x64
7MIXED CRAC...on.vbs
windows10-ltsc 2021-x64
1MIXED CRAC...ch.vbs
windows10-ltsc 2021-x64
1MIXED CRAC...rc.vbs
windows10-ltsc 2021-x64
1MIXED CRAC...ed.vbs
windows10-ltsc 2021-x64
1MIXED CRAC...dy.vbs
windows10-ltsc 2021-x64
1MIXED CRAC...ch.vbs
windows10-ltsc 2021-x64
1MIXED CRAC...er.dll
windows10-ltsc 2021-x64
1MIXED CRAC...it.dll
windows10-ltsc 2021-x64
1MIXED CRAC...or.exe
windows10-ltsc 2021-x64
7MIXED CRAC...st.exe
windows10-ltsc 2021-x64
1Analysis
-
max time kernel
150s -
max time network
159s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
17-11-2024 15:40
Behavioral task
behavioral1
Sample
MIXED CRACKING PACK #2/CryptoTrader BOT - FINAL Cracked by ap3x/commands/sysBOT.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
MIXED CRACKING PACK #2/Dork Combiner v1.2 by Volevanya/platforms/qwindows.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
MIXED CRACKING PACK #2/Dork Combiner v1.2 by Volevanya/platforms/qwindowsd.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
MIXED CRACKING PACK #2/DorkToolsV.5.0/Dorktools V.5.0.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral5
Sample
MIXED CRACKING PACK #2/DorkToolsV.5.0/IronPython.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral6
Sample
MIXED CRACKING PACK #2/DorkToolsV.5.0/ToolPortal/IronPython.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral7
Sample
MIXED CRACKING PACK #2/DorkToolsV.5.0/ToolPortal/Microsoft Windows Protocol Monitor.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral8
Sample
MIXED CRACKING PACK #2/DorkToolsV.5.0/ToolPortal/Microsoft Windows Protocol Services Host.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral9
Sample
MIXED CRACKING PACK #2/DorkToolsV.5.0/ToolPortal/SoftTool.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral10
Sample
MIXED CRACKING PACK #2/DorkToolsV.5.0/ToolPortal/msacm32.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral11
Sample
MIXED CRACKING PACK #2/DorkToolsV.5.0/msacm32.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral12
Sample
MIXED CRACKING PACK #2/Dorker Gorker/Gorker Private - Black Edition.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral13
Sample
MIXED CRACKING PACK #2/Dorker Gorker/MetroFramework.Design.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral14
Sample
MIXED CRACKING PACK #2/Dorker Gorker/MetroFramework.Fonts.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral15
Sample
MIXED CRACKING PACK #2/Dorker Gorker/MetroFramework.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral16
Sample
MIXED CRACKING PACK #2/Dorker Gorker/xNet/MetroFramework.Design.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral17
Sample
MIXED CRACKING PACK #2/Dorker Gorker/xNet/MetroFramework.Fonts.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral18
Sample
MIXED CRACKING PACK #2/Dorker Gorker/xNet/MetroFramework.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral19
Sample
MIXED CRACKING PACK #2/Dorker Gorker/xNet/Microsoft Windows Protocol Monitor.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral20
Sample
MIXED CRACKING PACK #2/Dorker Gorker/xNet/Microsoft Windows Protocol Services Host.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral21
Sample
MIXED CRACKING PACK #2/Dorker Gorker/xNet/xmt.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral22
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/Dr. VBS Virus Maker.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral23
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/Sources/Antideletion.vbs
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral24
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/Sources/Infectfiles-Search.vbs
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral25
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/Sources/Mirc.vbs
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral26
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/Sources/Outlook-Attached.vbs
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral27
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/Sources/Outlook-InBody.vbs
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral28
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/Sources/Pirch.vbs
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral29
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/WebDriver.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral30
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/Xceed.Wpf.Toolkit.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral31
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/data/Microsoft Windows Protocol Monitor.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral32
Sample
MIXED CRACKING PACK #2/Dr. VBS Virus Maker/data/Microsoft Windows Protocol Services Host.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
MIXED CRACKING PACK #2/DorkToolsV.5.0/ToolPortal/Microsoft Windows Protocol Monitor.exe
-
Size
9KB
-
MD5
61fce223872024b0ecb0bb2a7ffb7c47
-
SHA1
f893d620f9d843c8bdb86a0375f856508a6ce136
-
SHA256
4b5069b9708a8e97b17af6aa96cf2112877a675b4dbc1f6dbc2601b494b35d11
-
SHA512
8926a5f7d6aa862351044d79a634decda989b50ad422ba3e9a97c573ff618a8314607a7afe093925f56d87861eefb31d3820d9e02b1cf2847c0e6072880ac192
-
SSDEEP
96:EhFCaDIf/qRxXCaNKP0ZlI4yd89OEC60LZu2UIOwpotu0ljXg2+Pph2UA2vc2gWs:GdIf/Qgac0jI4CEZp0LVUhljXYplwWy
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Microsoft Windows Protocol Monitor.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4152190078-1497776152-96910572-1000\Control Panel\International\Geo\Nation Microsoft Windows Protocol Monitor.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Microsoft Windows Protocol Monitor.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Microsoft Windows Protocol Monitor.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
Microsoft Windows Protocol Services Host.exepid process 3192 Microsoft Windows Protocol Services Host.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Microsoft Windows Protocol Monitor.exepid process 3508 Microsoft Windows Protocol Monitor.exe 3508 Microsoft Windows Protocol Monitor.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Microsoft Windows Protocol Monitor.exedescription pid process Token: SeDebugPrivilege 3508 Microsoft Windows Protocol Monitor.exe -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
Microsoft Windows Protocol Monitor.exedescription pid process target process PID 3508 wrote to memory of 3192 3508 Microsoft Windows Protocol Monitor.exe Microsoft Windows Protocol Services Host.exe PID 3508 wrote to memory of 3192 3508 Microsoft Windows Protocol Monitor.exe Microsoft Windows Protocol Services Host.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\MIXED CRACKING PACK #2\DorkToolsV.5.0\ToolPortal\Microsoft Windows Protocol Monitor.exe"C:\Users\Admin\AppData\Local\Temp\MIXED CRACKING PACK #2\DorkToolsV.5.0\ToolPortal\Microsoft Windows Protocol Monitor.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\MIXED CRACKING PACK #2\DorkToolsV.5.0\ToolPortal\Microsoft Windows Protocol Services Host.exe"C:\Users\Admin\AppData\Local\Temp\MIXED CRACKING PACK #2\DorkToolsV.5.0\ToolPortal\Microsoft Windows Protocol Services Host.exe"2⤵
- Suspicious behavior: AddClipboardFormatListener
PID:3192
-