Overview
overview
10Static
static
3Crosshair-...er.rar
windows11-21h2-x64
10Crosshair-...-X.exe
windows11-21h2-x64
10Crosshair-...get.js
windows11-21h2-x64
3Crosshair-...get.js
windows11-21h2-x64
3Crosshair-...c.lock
windows11-21h2-x64
3Crosshair-...c.yaml
windows11-21h2-x64
3Crosshair-...t.dart
windows11-21h2-x64
3Crosshair-...on.png
windows11-21h2-x64
3Crosshair-...92.png
windows11-21h2-x64
3Crosshair-...12.png
windows11-21h2-x64
3Crosshair-...92.png
windows11-21h2-x64
3Crosshair-...12.png
windows11-21h2-x64
3Crosshair-...x.html
windows11-21h2-x64
1Crosshair-...t.json
windows11-21h2-x64
3Crosshair-...ignore
windows11-21h2-x64
3Crosshair-...ts.txt
windows11-21h2-x64
3Crosshair-...ts.txt
windows11-21h2-x64
3Crosshair-...ant.cc
windows11-21h2-x64
3Crosshair-...rant.h
windows11-21h2-x64
3Crosshair-....cmake
windows11-21h2-x64
3Crosshair-...ts.txt
windows11-21h2-x64
3Crosshair-...ner.rc
windows11-21h2-x64
3Crosshair-...ow.cpp
windows11-21h2-x64
3Crosshair-...ndow.h
windows11-21h2-x64
3Crosshair-...in.cpp
windows11-21h2-x64
3Crosshair-...urce.h
windows11-21h2-x64
3Crosshair-...on.ico
windows11-21h2-x64
3Crosshair-...xe.xml
windows11-21h2-x64
1Crosshair-...ls.cpp
windows11-21h2-x64
3Crosshair-...tils.h
windows11-21h2-x64
3Crosshair-...ow.cpp
windows11-21h2-x64
3Crosshair-...ndow.h
windows11-21h2-x64
3Analysis
-
max time kernel
116s -
max time network
119s -
platform
windows11-21h2_x64 -
resource
win11-20241007-de -
resource tags
arch:x64arch:x86image:win11-20241007-delocale:de-deos:windows11-21h2-x64systemwindows -
submitted
06-12-2024 13:19
Static task
static1
Behavioral task
behavioral1
Sample
Crosshair-X-Crack-master.rar
Resource
win11-20241007-de
Behavioral task
behavioral2
Sample
Crosshair-X-Crack-master/Crosshair-X.exe
Resource
win11-20241023-de
Behavioral task
behavioral3
Sample
Crosshair-X-Crack-master/lib/widget/textfield/textfield_email_widget.js
Resource
win11-20241007-de
Behavioral task
behavioral4
Sample
Crosshair-X-Crack-master/lib/widget/textfield/textfield_pass_widget.js
Resource
win11-20241007-de
Behavioral task
behavioral5
Sample
Crosshair-X-Crack-master/pubspec.lock
Resource
win11-20241007-de
Behavioral task
behavioral6
Sample
Crosshair-X-Crack-master/pubspec.yaml
Resource
win11-20241023-de
Behavioral task
behavioral7
Sample
Crosshair-X-Crack-master/test/widget_test.dart
Resource
win11-20241007-de
Behavioral task
behavioral8
Sample
Crosshair-X-Crack-master/web/favicon.png
Resource
win11-20241007-de
Behavioral task
behavioral9
Sample
Crosshair-X-Crack-master/web/icons/Icon-192.png
Resource
win11-20241007-de
Behavioral task
behavioral10
Sample
Crosshair-X-Crack-master/web/icons/Icon-512.png
Resource
win11-20241007-de
Behavioral task
behavioral11
Sample
Crosshair-X-Crack-master/web/icons/Icon-maskable-192.png
Resource
win11-20241007-de
Behavioral task
behavioral12
Sample
Crosshair-X-Crack-master/web/icons/Icon-maskable-512.png
Resource
win11-20241007-de
Behavioral task
behavioral13
Sample
Crosshair-X-Crack-master/web/index.html
Resource
win11-20241007-de
Behavioral task
behavioral14
Sample
Crosshair-X-Crack-master/web/manifest.json
Resource
win11-20241007-de
Behavioral task
behavioral15
Sample
Crosshair-X-Crack-master/windows/.gitignore
Resource
win11-20241007-de
Behavioral task
behavioral16
Sample
Crosshair-X-Crack-master/windows/CMakeLists.txt
Resource
win11-20241007-de
Behavioral task
behavioral17
Sample
Crosshair-X-Crack-master/windows/flutter/CMakeLists.txt
Resource
win11-20241007-de
Behavioral task
behavioral18
Sample
Crosshair-X-Crack-master/windows/flutter/generated_plugin_registrant.cc
Resource
win11-20241007-de
Behavioral task
behavioral19
Sample
Crosshair-X-Crack-master/windows/flutter/generated_plugin_registrant.h
Resource
win11-20241007-de
Behavioral task
behavioral20
Sample
Crosshair-X-Crack-master/windows/flutter/generated_plugins.cmake
Resource
win11-20241007-de
Behavioral task
behavioral21
Sample
Crosshair-X-Crack-master/windows/runner/CMakeLists.txt
Resource
win11-20241007-de
Behavioral task
behavioral22
Sample
Crosshair-X-Crack-master/windows/runner/Runner.rc
Resource
win11-20241007-de
Behavioral task
behavioral23
Sample
Crosshair-X-Crack-master/windows/runner/flutter_window.cpp
Resource
win11-20241007-de
Behavioral task
behavioral24
Sample
Crosshair-X-Crack-master/windows/runner/flutter_window.h
Resource
win11-20241007-de
Behavioral task
behavioral25
Sample
Crosshair-X-Crack-master/windows/runner/main.cpp
Resource
win11-20241007-de
Behavioral task
behavioral26
Sample
Crosshair-X-Crack-master/windows/runner/resource.h
Resource
win11-20241007-de
Behavioral task
behavioral27
Sample
Crosshair-X-Crack-master/windows/runner/resources/app_icon.ico
Resource
win11-20241007-de
Behavioral task
behavioral28
Sample
Crosshair-X-Crack-master/windows/runner/runner.exe.xml
Resource
win11-20241007-de
Behavioral task
behavioral29
Sample
Crosshair-X-Crack-master/windows/runner/utils.cpp
Resource
win11-20241007-de
Behavioral task
behavioral30
Sample
Crosshair-X-Crack-master/windows/runner/utils.h
Resource
win11-20241007-de
Behavioral task
behavioral31
Sample
Crosshair-X-Crack-master/windows/runner/win32_window.cpp
Resource
win11-20241007-de
Behavioral task
behavioral32
Sample
Crosshair-X-Crack-master/windows/runner/win32_window.h
Resource
win11-20241007-de
General
-
Target
Crosshair-X-Crack-master.rar
-
Size
491KB
-
MD5
fe4f2896d92f18823b966ebabfd970de
-
SHA1
609180eecc4bb86d4055b121d7d10ea4e7c17a47
-
SHA256
9504fbdc366ff1c3d41b463c5cd8d87fbf5eef9755a578ceb90ce18c3f751986
-
SHA512
51659e089eb4de76dddb51f44518df8786073a3af39ccaf1dd0172e9bcb5494b9f4f9cf1c43702d15016d57f4f3ae2b6efc7e90a717218e7801c82cb6a5b7626
-
SSDEEP
12288:0NUp+mgaDSKI7j6oDomBXhxyHVyUMm7RkQEhmV/04XB:0C7gCInbU7wUF72mR7B
Malware Config
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
Signatures
-
Lumma family
-
Executes dropped EXE 7 IoCs
pid Process 2376 Crosshair-X.exe 4408 Crosshair-X.exe 2552 Crosshair-X.exe 4808 Crosshair-X.exe 2816 Crosshair-X.exe 1856 Crosshair-X.exe 4624 Crosshair-X.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2376 set thread context of 4408 2376 Crosshair-X.exe 84 PID 2552 set thread context of 4808 2552 Crosshair-X.exe 93 PID 2816 set thread context of 4624 2816 Crosshair-X.exe 97 -
Program crash 6 IoCs
pid pid_target Process procid_target 1456 4408 WerFault.exe 84 1464 4408 WerFault.exe 84 4672 4808 WerFault.exe 93 1812 4808 WerFault.exe 93 3216 4624 WerFault.exe 97 276 4624 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Crosshair-X.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Crosshair-X.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Crosshair-X.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Crosshair-X.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Crosshair-X.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Crosshair-X.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 952 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 952 7zFM.exe Token: 35 952 7zFM.exe Token: SeSecurityPrivilege 952 7zFM.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 952 7zFM.exe 952 7zFM.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2376 wrote to memory of 4408 2376 Crosshair-X.exe 84 PID 2376 wrote to memory of 4408 2376 Crosshair-X.exe 84 PID 2376 wrote to memory of 4408 2376 Crosshair-X.exe 84 PID 2376 wrote to memory of 4408 2376 Crosshair-X.exe 84 PID 2376 wrote to memory of 4408 2376 Crosshair-X.exe 84 PID 2376 wrote to memory of 4408 2376 Crosshair-X.exe 84 PID 2376 wrote to memory of 4408 2376 Crosshair-X.exe 84 PID 2376 wrote to memory of 4408 2376 Crosshair-X.exe 84 PID 2376 wrote to memory of 4408 2376 Crosshair-X.exe 84 PID 2376 wrote to memory of 4408 2376 Crosshair-X.exe 84 PID 2552 wrote to memory of 4808 2552 Crosshair-X.exe 93 PID 2552 wrote to memory of 4808 2552 Crosshair-X.exe 93 PID 2552 wrote to memory of 4808 2552 Crosshair-X.exe 93 PID 2552 wrote to memory of 4808 2552 Crosshair-X.exe 93 PID 2552 wrote to memory of 4808 2552 Crosshair-X.exe 93 PID 2552 wrote to memory of 4808 2552 Crosshair-X.exe 93 PID 2552 wrote to memory of 4808 2552 Crosshair-X.exe 93 PID 2552 wrote to memory of 4808 2552 Crosshair-X.exe 93 PID 2552 wrote to memory of 4808 2552 Crosshair-X.exe 93 PID 2552 wrote to memory of 4808 2552 Crosshair-X.exe 93 PID 2816 wrote to memory of 1856 2816 Crosshair-X.exe 96 PID 2816 wrote to memory of 1856 2816 Crosshair-X.exe 96 PID 2816 wrote to memory of 1856 2816 Crosshair-X.exe 96 PID 2816 wrote to memory of 4624 2816 Crosshair-X.exe 97 PID 2816 wrote to memory of 4624 2816 Crosshair-X.exe 97 PID 2816 wrote to memory of 4624 2816 Crosshair-X.exe 97 PID 2816 wrote to memory of 4624 2816 Crosshair-X.exe 97 PID 2816 wrote to memory of 4624 2816 Crosshair-X.exe 97 PID 2816 wrote to memory of 4624 2816 Crosshair-X.exe 97 PID 2816 wrote to memory of 4624 2816 Crosshair-X.exe 97 PID 2816 wrote to memory of 4624 2816 Crosshair-X.exe 97 PID 2816 wrote to memory of 4624 2816 Crosshair-X.exe 97 PID 2816 wrote to memory of 4624 2816 Crosshair-X.exe 97
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Crosshair-X-Crack-master.rar"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:952
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1664
-
C:\Users\Admin\Crosshair-X.exe"C:\Users\Admin\Crosshair-X.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\Crosshair-X.exe"C:\Users\Admin\Crosshair-X.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4408 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4408 -s 13483⤵
- Program crash
PID:1456
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4408 -s 13323⤵
- Program crash
PID:1464
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4408 -ip 44081⤵PID:1100
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4408 -ip 44081⤵PID:4724
-
C:\Users\Admin\Crosshair-X.exe"C:\Users\Admin\Crosshair-X.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\Crosshair-X.exe"C:\Users\Admin\Crosshair-X.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4808 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 13283⤵
- Program crash
PID:4672
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4808 -s 11523⤵
- Program crash
PID:1812
-
-
-
C:\Users\Admin\Crosshair-X.exe"C:\Users\Admin\Crosshair-X.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\Crosshair-X.exe"C:\Users\Admin\Crosshair-X.exe"2⤵
- Executes dropped EXE
PID:1856
-
-
C:\Users\Admin\Crosshair-X.exe"C:\Users\Admin\Crosshair-X.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4624 -s 13483⤵
- Program crash
PID:3216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4624 -s 13683⤵
- Program crash
PID:276
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4808 -ip 48081⤵PID:4680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4808 -ip 48081⤵PID:1532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4624 -ip 46241⤵PID:2584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4624 -ip 46241⤵PID:2164
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:4480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20.5MB
MD5e44b4dfe614da54a395c203d58f2f489
SHA11f05ca23000ec626ce32041b3ae3baec2c6fa248
SHA256240db8852efca1ff49dedfe045796def881458b74e09c2ab4a5f588bf66c25d0
SHA512b852aaf7d63ee6f665331f7b1ba78d0ec9e9208e0e7840263c67d6579b1aa552dddb1ed52335cfa843f5f9a3947fa8642852c49eda47e3f6a89746c9e5323fff