Overview
overview
10Static
static
10aquatic_cracked.zip
windows7-x64
1aquatic_cracked.zip
windows10-2004-x64
8config.toml
windows7-x64
3config.toml
windows10-2004-x64
8crack.dll
windows7-x64
9crack.dll
windows10-2004-x64
9loader.exe
windows7-x64
10loader.exe
windows10-2004-x64
10main.exe
windows7-x64
7main.exe
windows10-2004-x64
8Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-02-2025 03:18
Behavioral task
behavioral1
Sample
aquatic_cracked.zip
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
aquatic_cracked.zip
Resource
win10v2004-20250211-en
Behavioral task
behavioral3
Sample
config.toml
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
config.toml
Resource
win10v2004-20250211-en
Behavioral task
behavioral5
Sample
crack.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
crack.dll
Resource
win10v2004-20250207-en
Behavioral task
behavioral7
Sample
loader.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
loader.exe
Resource
win10v2004-20250211-en
Behavioral task
behavioral9
Sample
main.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
main.exe
Resource
win10v2004-20250207-en
General
-
Target
main.exe
-
Size
24.1MB
-
MD5
c4639a9dd4fa418a1e2e5537b9a53bfe
-
SHA1
9fea0f4615170667aa59dac92f6d424455b5fc54
-
SHA256
6548853e51522d28bc2d4ee6dbecdfe7be496462cb87f26587f830374ce07ec7
-
SHA512
2e5f53a2d4bae0028ecb715485327db9da7aeb45176e7e54db039516dab6002f41b5f44ae728f7752ee840f34b14ac78698cea3bc4cc2d00ea815873bad6b692
-
SSDEEP
786432:8Ljr7FsBzlI0ecXYc1xk/cBFG8zv7NRDZPA:oezlI1kLxJBFGu7HFY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 824 main.exe -
Loads dropped DLL 2 IoCs
pid Process 2900 main.exe 824 main.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2900 wrote to memory of 824 2900 main.exe 29 PID 2900 wrote to memory of 824 2900 main.exe 29 PID 2900 wrote to memory of 824 2900 main.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\main.exe"C:\Users\Admin\AppData\Local\Temp\main.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\onefile_2900_133842359716040000\main.exe"C:\Users\Admin\AppData\Local\Temp\main.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36.6MB
MD5fd558700e832c55b847fbaa2f9c77f48
SHA1db8a95fa38c5f59f7908c4a36efe4f62191c3f77
SHA25689ccb259276786bda67b5f70d1dbc55eb7d0ab6333254f75b6f60fee10c30637
SHA51214d275d4f3b9c4c06920dbc7fd85c01357402eba85968a06cabb0852c43d9d64d1d30e9dffd744c450b3174064f95076369f1f8173dcfd3412b89f194f71dc41
-
Filesize
5.5MB
MD558e01abc9c9b5c885635180ed104fe95
SHA11c2f7216b125539d63bd111a7aba615c69deb8ba
SHA256de1b95d2e951fc048c84684bc7df4346138910544ee335b61fc8e65f360c3837
SHA512cd32c77191309d99aeed47699501b357b35669123f0dd70ed97c3791a009d1855ab27162db24a4bd9e719b68ee3b0539ee6db88e71abb9a2d4d629f87bc2c081