Overview
overview
10Static
static
10Rdp Cracking tool.zip
windows7-x64
10Rdp Cracking tool.zip
windows10-2004-x64
1Rdp Cracki...g1.exe
windows7-x64
3Rdp Cracki...g1.exe
windows10-2004-x64
3Rdp Cracki...or.exe
windows7-x64
10Rdp Cracki...or.exe
windows10-2004-x64
10Rdp Cracki...e4.dll
windows7-x64
3Rdp Cracki...e4.dll
windows10-2004-x64
3Rdp Cracki...i4.dll
windows7-x64
3Rdp Cracki...i4.dll
windows10-2004-x64
3Rdp Cracki...k4.dll
windows7-x64
3Rdp Cracki...k4.dll
windows10-2004-x64
3Rdp Cracki...ts.txt
windows7-x64
1Rdp Cracki...ts.txt
windows10-2004-x64
1Rdp Cracki...ng.cfg
windows7-x64
1Rdp Cracki...ng.cfg
windows10-2004-x64
1Rdp Cracki...g1.jpg
windows7-x64
1Rdp Cracki...g1.jpg
windows10-2004-x64
1Rdp Cracki...g1.jpg
windows7-x64
1Rdp Cracki...g1.jpg
windows10-2004-x64
1Rdp Cracki...g1.exe
windows7-x64
9Rdp Cracki...g1.exe
windows10-2004-x64
9Rdp Cracki...or.exe
windows7-x64
10Rdp Cracki...or.exe
windows10-2004-x64
10Rdp Cracki...Me.txt
windows7-x64
1Rdp Cracki...Me.txt
windows10-2004-x64
1Rdp Cracki...ls.txt
windows7-x64
1Rdp Cracki...ls.txt
windows10-2004-x64
1Rdp Cracki...od.txt
windows7-x64
1Rdp Cracki...od.txt
windows10-2004-x64
1Rdp Cracki...rs.txt
windows7-x64
1Rdp Cracki...rs.txt
windows10-2004-x64
1Analysis
-
max time kernel
429s -
max time network
432s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2025 20:19
Behavioral task
behavioral1
Sample
Rdp Cracking tool.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Rdp Cracking tool.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/KPortScan3 @virusbug1.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/KPortScan3 @virusbug1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/Kport scan Activator.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/Kport scan Activator.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/QtCore4.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/QtCore4.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/QtGui4.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/QtGui4.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/QtNetwork4.dll
Resource
win7-20240729-en
Behavioral task
behavioral12
Sample
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/QtNetwork4.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/results.txt
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/results.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/results.txt.terabox.uploading.cfg
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/results.txt.terabox.uploading.cfg
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/@virusbug1.jpg
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/@virusbug1.jpg
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/NL Brute @virusbug1/@virusbug1.jpg
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/NL Brute @virusbug1/@virusbug1.jpg
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/NL Brute @virusbug1/NL Brute 1.2 @virusbug1.exe
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/NL Brute @virusbug1/NL Brute 1.2 @virusbug1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/NL Brute @virusbug1/NL Brute Activator.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/NL Brute @virusbug1/NL Brute Activator.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/NL Brute @virusbug1/Read Me.txt
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/NL Brute @virusbug1/Read Me.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/NL Brute @virusbug1/credentials.txt
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/NL Brute @virusbug1/credentials.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/NL Brute @virusbug1/good.txt
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/NL Brute @virusbug1/good.txt
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/NL Brute @virusbug1/servers.txt
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
Rdp Cracking tool @ virusbug1/NL Brute @virusbug1/NL Brute @virusbug1/servers.txt
Resource
win10v2004-20241007-en
General
-
Target
Rdp Cracking tool @ virusbug1/KPortScan 3.0 @virusbug1/QtCore4.dll
-
Size
2.4MB
-
MD5
438717377b9df0f53f283c9e4aa722cc
-
SHA1
c413917dfcb816799613c6f86b55952c887ff711
-
SHA256
a679cf46e128d028de22fb9ed8432e5107e53f8e7e6fb7f5e169b3eeab8f000a
-
SHA512
03c10588ec47bce9b6c40fedffcaa775b84bb691450789000c17e7df02554036ee336d382524b35bfa67dbc4ae4b95d3d1807d61f46016427856f60850383f3f
-
SSDEEP
49152:vfGCzRdEZK8hyX2ntJsv6tWKFdu9CeTxLyvL/6mShMZtmjNUVrciV5P+7QVg07Tl:vf8KF2tJsv6tWKFdu9CIK
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1928 2836 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1584 wrote to memory of 2836 1584 rundll32.exe 83 PID 1584 wrote to memory of 2836 1584 rundll32.exe 83 PID 1584 wrote to memory of 2836 1584 rundll32.exe 83
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\Rdp Cracking tool @ virusbug1\KPortScan 3.0 @virusbug1\QtCore4.dll",#11⤵
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe "C:\Users\Admin\AppData\Local\Temp\Rdp Cracking tool @ virusbug1\KPortScan 3.0 @virusbug1\QtCore4.dll",#12⤵
- System Location Discovery: System Language Discovery
PID:2836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2836 -s 6483⤵
- Program crash
PID:1928
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2836 -ip 28361⤵PID:4824