Analysis
-
max time kernel
12s -
max time network
15s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
19/11/2024, 15:32
Static task
static1
2 signatures
Behavioral task
behavioral1
Sample
CRACKED CLOUDY/cloudy-cracked.exe
Resource
win11-20241007-en
3 signatures
150 seconds
General
-
Target
CRACKED CLOUDY/cloudy-cracked.exe
-
Size
1.3MB
-
MD5
f6138d4bcc2ad07e24542a4d1af1fbf1
-
SHA1
fe5c9391cf451b05a10a09ad842de4d7fc14e2d9
-
SHA256
aaaa841b7c207f3ec7a41922e6873e637d8640deb81229b816d4b524bb318ab5
-
SHA512
4a7270c05281d638d0b498e90bf3b8409e76e76af17e494cfe1bd384e61656f7e1fad30b20483dbaf4597e3e3a6aa36e91c661df4f4f3fa2f75907c60319a543
-
SSDEEP
24576:3QJLxgQVz/df8zhvPC6WBXZlF6J6g8iLIYusX2gdZqbJvtzhv:3AiEz4hvPUBzIOLQIBthv
Score
1/10
Malware Config
Signatures
-
Delays execution with timeout.exe 1 IoCs
pid Process 4208 timeout.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3088 cloudy-cracked.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3088 wrote to memory of 5032 3088 cloudy-cracked.exe 80 PID 3088 wrote to memory of 5032 3088 cloudy-cracked.exe 80 PID 5032 wrote to memory of 4440 5032 cmd.exe 82 PID 5032 wrote to memory of 4440 5032 cmd.exe 82 PID 4440 wrote to memory of 4208 4440 cmd.exe 84 PID 4440 wrote to memory of 4208 4440 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\CRACKED CLOUDY\cloudy-cracked.exe"C:\Users\Admin\AppData\Local\Temp\CRACKED CLOUDY\cloudy-cracked.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c start cmd /C "color b && title Error && echo You must run the function KeyAuthApp.init(); first && timeout /t 5"2⤵
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\system32\cmd.execmd /C "color b && title Error && echo You must run the function KeyAuthApp.init(); first && timeout /t 5"3⤵
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\system32\timeout.exetimeout /t 54⤵
- Delays execution with timeout.exe
PID:4208
-
-
-