Analysis
-
max time kernel
121s -
max time network
102s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
19/11/2024, 18:49
Behavioral task
behavioral1
Sample
crowntool.exe
Resource
win11-20241007-en
General
-
Target
crowntool.exe
-
Size
11.0MB
-
MD5
372cbb8e491626eba8c68150895aea5a
-
SHA1
b2b614750d223399f09635e533e0670371b8287a
-
SHA256
55c6356977959b504ed469f82a47e519ce9183fa369703cc5c694313955701ba
-
SHA512
e950dbaaacd16458e970b51129232bc595c6c971c2b4a246dce190b3d2f10671b9e7a2b1b90e37b041bf2ed3e0fd9ce6c6d5262baf03d8c4884bd47f19b495a6
-
SSDEEP
196608:x2kwZVjZL2Vmd6+Dx2UajEwQ8jV6FOF4VRwaWc/f/+ScEVR1UJFMQKn1Q2:ZYZL2Vmd6mx2pjhV6q+CBc/eWR1UJF2m
Malware Config
Signatures
-
Loads dropped DLL 19 IoCs
pid Process 3752 crowntool.exe 3752 crowntool.exe 3752 crowntool.exe 3752 crowntool.exe 3752 crowntool.exe 3752 crowntool.exe 3752 crowntool.exe 3752 crowntool.exe 3752 crowntool.exe 3752 crowntool.exe 3752 crowntool.exe 3752 crowntool.exe 3752 crowntool.exe 3752 crowntool.exe 3752 crowntool.exe 3752 crowntool.exe 3752 crowntool.exe 3752 crowntool.exe 3752 crowntool.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 9 IoCs
flow ioc 26 raw.githubusercontent.com 12 raw.githubusercontent.com 16 raw.githubusercontent.com 21 raw.githubusercontent.com 20 raw.githubusercontent.com 27 raw.githubusercontent.com 5 raw.githubusercontent.com 11 raw.githubusercontent.com 13 raw.githubusercontent.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3752 crowntool.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1544 wrote to memory of 3752 1544 crowntool.exe 81 PID 1544 wrote to memory of 3752 1544 crowntool.exe 81 PID 3752 wrote to memory of 4364 3752 crowntool.exe 82 PID 3752 wrote to memory of 4364 3752 crowntool.exe 82 PID 3752 wrote to memory of 2104 3752 crowntool.exe 83 PID 3752 wrote to memory of 2104 3752 crowntool.exe 83 PID 3752 wrote to memory of 988 3752 crowntool.exe 84 PID 3752 wrote to memory of 988 3752 crowntool.exe 84 PID 3752 wrote to memory of 1992 3752 crowntool.exe 85 PID 3752 wrote to memory of 1992 3752 crowntool.exe 85 PID 3752 wrote to memory of 3148 3752 crowntool.exe 86 PID 3752 wrote to memory of 3148 3752 crowntool.exe 86 PID 3752 wrote to memory of 3836 3752 crowntool.exe 87 PID 3752 wrote to memory of 3836 3752 crowntool.exe 87 PID 3752 wrote to memory of 3128 3752 crowntool.exe 88 PID 3752 wrote to memory of 3128 3752 crowntool.exe 88 PID 3752 wrote to memory of 3024 3752 crowntool.exe 89 PID 3752 wrote to memory of 3024 3752 crowntool.exe 89 PID 3752 wrote to memory of 2752 3752 crowntool.exe 90 PID 3752 wrote to memory of 2752 3752 crowntool.exe 90 PID 3752 wrote to memory of 4488 3752 crowntool.exe 91 PID 3752 wrote to memory of 4488 3752 crowntool.exe 91 PID 3752 wrote to memory of 1036 3752 crowntool.exe 92 PID 3752 wrote to memory of 1036 3752 crowntool.exe 92 PID 3752 wrote to memory of 2404 3752 crowntool.exe 93 PID 3752 wrote to memory of 2404 3752 crowntool.exe 93 PID 3752 wrote to memory of 3168 3752 crowntool.exe 94 PID 3752 wrote to memory of 3168 3752 crowntool.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\crowntool.exe"C:\Users\Admin\AppData\Local\Temp\crowntool.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\crowntool.exe"C:\Users\Admin\AppData\Local\Temp\crowntool.exe"2⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "ver"3⤵PID:4364
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:2104
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c title crown3⤵PID:988
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:1992
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:3148
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c title crown3⤵PID:3836
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:3128
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:3024
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c title crown3⤵PID:2752
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:4488
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:1036
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c title crown3⤵PID:2404
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:3168
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5f12681a472b9dd04a812e16096514974
SHA16fd102eb3e0b0e6eef08118d71f28702d1a9067c
SHA256d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8
SHA5127d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2
-
Filesize
62KB
MD56eb3c9fc8c216cea8981b12fd41fbdcd
SHA15f3787051f20514bb9e34f9d537d78c06e7a43e6
SHA2563b0661ef2264d6566368b677c732ba062ac4688ef40c22476992a0f9536b0010
SHA5122027707824d0948673443dd54b4f45bc44680c05c3c4a193c7c1803a1030124ad6c8fbe685cc7aaf15668d90c4cd9bfb93de51ea8db4af5abe742c1ef2dcd08b
-
Filesize
81KB
MD5a4b636201605067b676cc43784ae5570
SHA1e9f49d0fc75f25743d04ce23c496eb5f89e72a9a
SHA256f178e29921c04fb68cc08b1e5d1181e5df8ce1de38a968778e27990f4a69973c
SHA51202096bc36c7a9ecfa1712fe738b5ef8b78c6964e0e363136166657c153727b870a6a44c1e1ec9b81289d1aa0af9c85f1a37b95b667103edc2d3916280b6a9488
-
Filesize
119KB
MD587596db63925dbfe4d5f0f36394d7ab0
SHA1ad1dd48bbc078fe0a2354c28cb33f92a7e64907e
SHA25692d7954d9099762d81c1ae2836c11b6ba58c1883fde8eeefe387cc93f2f6afb4
SHA512e6d63e6fe1c3bd79f1e39cb09b6f56589f0ee80fd4f4638002fe026752bfa65457982adbef13150fa2f36e68771262d9378971023e07a75d710026ed37e83d7b
-
Filesize
60KB
MD549ce7a28e1c0eb65a9a583a6ba44fa3b
SHA1dcfbee380e7d6c88128a807f381a831b6a752f10
SHA2561be5cfd06a782b2ae8e4629d9d035cbc487074e8f63b9773c85e317be29c0430
SHA512cf1f96d6d61ecb2997bb541e9eda7082ef4a445d3dd411ce6fd71b0dfe672f4dfaddf36ae0fb7d5f6d1345fbd90c19961a8f35328332cdaa232f322c0bf9a1f9
-
Filesize
154KB
MD5b5fbc034ad7c70a2ad1eb34d08b36cf8
SHA14efe3f21be36095673d949cceac928e11522b29c
SHA25680a6ebe46f43ffa93bbdbfc83e67d6f44a44055de1439b06e4dd2983cb243df6
SHA512e7185da748502b645030c96d3345d75814ba5fd95a997c2d1c923d981c44d5b90db64faf77ddbbdc805769af1bec37daf0ecee0930a248b67a1c2d92b59c250c
-
Filesize
47KB
MD57e6bd435c918e7c34336c7434404eedf
SHA1f3a749ad1d7513ec41066ab143f97fa4d07559e1
SHA2560606a0c5c4ab46c4a25ded5a2772e672016cac574503681841800f9059af21c4
SHA512c8bf4b1ec6c8fa09c299a8418ee38cdccb04afa3a3c2e6d92625dbc2de41f81dd0df200fd37fcc41909c2851ac5ca936af632307115b9ac31ec020d9ed63f157
-
Filesize
1.1MB
MD508a07dd672a94112c366807813b52676
SHA11009937cb3c5b4907e831707971b8bc36cc1a653
SHA256dec0136a9dccdc43876d5ad65bb926c4c971a95572bbf53b3925d7afd307f346
SHA512b79240416964677469a0050025b86aa53721be9eb50b971929c71efa96aa1d0c32e71c1a11f1e19042af08af9703d65f0f667ec1a87c2f32d241163b1294924c
-
Filesize
29KB
MD523f4becf6a1df36aee468bb0949ac2bc
SHA1a0e027d79a281981f97343f2d0e7322b9fe9b441
SHA25609c5faf270fd63bde6c45cc53b05160262c7ca47d4c37825ed3e15d479daee66
SHA5123ee5b3b7583be1408c0e1e1c885512445a7e47a69ff874508e8f0a00a66a40a0e828ce33e6f30ddc3ac518d69e4bb96c8b36011fb4ededf9a9630ef98a14893b
-
Filesize
75KB
MD5e137df498c120d6ac64ea1281bcab600
SHA1b515e09868e9023d43991a05c113b2b662183cfe
SHA2568046bf64e463d5aa38d13525891156131cf997c2e6cdf47527bc352f00f5c90a
SHA512cc2772d282b81873aa7c5cba5939d232cceb6be0908b211edb18c25a17cbdb5072f102c0d6b7bc9b6b2f1f787b56ab1bc9be731bb9e98885c17e26a09c2beb90
-
Filesize
155KB
MD535f66ad429cd636bcad858238c596828
SHA1ad4534a266f77a9cdce7b97818531ce20364cb65
SHA25658b772b53bfe898513c0eb264ae4fa47ed3d8f256bc8f70202356d20f9ecb6dc
SHA5121cca8e6c3a21a8b05cc7518bd62c4e3f57937910f2a310e00f13f60f6a94728ef2004a2f4a3d133755139c3a45b252e6db76987b6b78bc8269a21ad5890356ad
-
Filesize
1.0MB
MD5538a54e8298e8b25289be7239a44e934
SHA19428f35c3498c367ef89e8849b416c7fbe4e1497
SHA2563f0c5956ccfa8e85db610f37ac6cb93fc3d3133f412570f28d7fd3289570d3bf
SHA5121c9b2c291fea7a1eaa8b33518a76e33bb0bc401c3e1205d17fe826dae04d45a655587fc550fcdd679e0331b0c6bc1e4859f01b9c29a621a81b9de3494f4bb9b0
-
Filesize
278KB
MD5b18e918767d99291f8771414b76a8e65
SHA1ea544791b23e4a8f47ace99b9d08b3609d511293
SHA256a59fde883a0ef9d74ab9dad009689e00173d28595b57416c98b2ee83280c6e4c
SHA51278a4eac65754fb8d37c1da85534d6e1dd0eb2b3535ef59d75c34a91d716afc94258599b1078c03a4b81e142945b13e671ec46b5f2fcb8c8c46150ae7506e0d8d
-
Filesize
3.3MB
MD5ab01c808bed8164133e5279595437d3d
SHA10f512756a8db22576ec2e20cf0cafec7786fb12b
SHA2569c0a0a11629cced6a064932e95a0158ee936739d75a56338702fed97cb0bad55
SHA5124043cda02f6950abdc47413cfd8a0ba5c462f16bcd4f339f9f5a690823f4d0916478cab5cae81a3d5b03a8a196e17a716b06afee3f92dec3102e3bbc674774f2
-
Filesize
32KB
MD5eef7981412be8ea459064d3090f4b3aa
SHA1c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016
-
Filesize
682KB
MD5de72697933d7673279fb85fd48d1a4dd
SHA1085fd4c6fb6d89ffcc9b2741947b74f0766fc383
SHA256ed1c8769f5096afd000fc730a37b11177fcf90890345071ab7fbceac684d571f
SHA5120fd4678c65da181d7c27b19056d5ab0e5dd0e9714e9606e524cdad9e46ec4d0b35fe22d594282309f718b30e065f6896674d3edce6b3b0c8eb637a3680715c2c
-
Filesize
128KB
MD53c211c05c085c100fc3fae1e7d983abc
SHA1fdf9ffac4af54541eedbe46b9f733b513be03157
SHA25613ce41b1370dfa90be90691b1fcbab186172d90573a6aaf73e4068d9a17b95bf
SHA5122e196fb09e6608e9e81e224a0c2ff903870170fb31ed67e76805ba1badf288dcb85aeacf5241016df1e9c9682fed5ead7cb42586735b912653219c2540ac814e
-
Filesize
3.7MB
MD5da566fba4cc4371446fbd2a210b14d91
SHA1f6b1718cad1249182c495b540adf5f1cfa2418aa
SHA2565be41a4d5d0b2991408a4e987703c8c666b7f1d50797f0149dbfba02dc2e43c6
SHA512b661133fba0509d70f625e9dddb908732d3a326411f68b20c7cafd86d33093d312a95eee750b57693cb349781d2dd4176be76ee4d715920d3d6d292ae51779f7
-
Filesize
4.3MB
MD5c80b5cb43e5fe7948c3562c1fff1254e
SHA1f73cb1fb9445c96ecd56b984a1822e502e71ab9d
SHA256058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20
SHA512faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81
-
Filesize
28KB
MD5adc412384b7e1254d11e62e451def8e9
SHA104e6dff4a65234406b9bc9d9f2dcfe8e30481829
SHA25668b80009ab656ffe811d680585fac3d4f9c1b45f29d48c67ea2b3580ec4d86a1
SHA512f250f1236882668b2686bd42e1c334c60da7abec3a208ebebdee84a74d7c4c6b1bc79eed7241bc7012e4ef70a6651a32aa00e32a83f402475b479633581e0b07
-
Filesize
1.1MB
MD5102bbbb1f33ce7c007aac08fe0a1a97e
SHA19a8601bea3e7d4c2fa6394611611cda4fc76e219
SHA2562cf6c5dea30bb0584991b2065c052c22d258b6e15384447dcea193fdcac5f758
SHA512a07731f314e73f7a9ea73576a89ccb8a0e55e53f9b5b82f53121b97b1814d905b17a2da9bd2eda9f9354fc3f15e3dea7a613d7c9bc98c36bba653743b24dfc32
-
Filesize
15KB
MD5c185dc8773c0b214c2398e368496f0a1
SHA1202acfd475db32aa0162311ca24872b3cf0ab1ab
SHA256c402d27d1b22968261850548aefccc7f98d8de6e743dc32b168d6b01e31e54b5
SHA512ac09efc5e2814d1d135a73c519b24b435e68f93a6831bf7b9386b7a860835b86d8b5d349709882293e7f3103fa1779f081cac3d5e89d834c65771a49b77c8be4
-
Filesize
51KB
MD51eca53da0fcee1b94c5676a45f532d28
SHA1b49b54525d1f98c8d3a93429fbb1f5ad91a80958
SHA256163191269f30c25f5dcf44191263229500b6029f19dacc1dbf12b2cb0a07ced0
SHA512a26d620f3c80033c3c259edeaf48927f8e7207d6d0196e6d378b357c6716243cda6362f1efa9f9f80b76555e72f4eba2d2835a95dc235dce2f9953ccce0d2746