Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-02-2025 14:31
Static task
static1
Behavioral task
behavioral1
Sample
crack2013.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
crack2013.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
setup 2.1.exe
Resource
win7-20240903-en
General
-
Target
crack2013.exe
-
Size
140KB
-
MD5
7282ad47419c55f6e560a68d16dee2c4
-
SHA1
113b4bd76ebd874304728d5a879b1fb06058140e
-
SHA256
a4f862066ca5fae36faef0167f2a919637797869c6b338b1ec3e0f9a56af21f1
-
SHA512
4f576308f64895c6cc8ac75485ddf8dacffdf5fc85318e8d8fa3bc4d1e3d636c0686106d5b0c3cf5b0dc88df4b5984f535a6a8a0b6f25649d05dce1df2f9fadc
-
SSDEEP
3072:c4yXTm8fD3XhefvpaFoAePQ3z13XPDo6bSb0sifsI62JB4O:EYxwh7Sb2LJBn
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2340 svchosts.exe 2208 svchosts.exe -
Loads dropped DLL 8 IoCs
pid Process 2680 crack2013.exe 2340 svchosts.exe 2340 svchosts.exe 2340 svchosts.exe 2340 svchosts.exe 2208 svchosts.exe 2208 svchosts.exe 2208 svchosts.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU Key = "C:\\Users\\Admin\\AppData\\Roaming\\svchosts.exe" svchosts.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM Key = "C:\\Users\\Admin\\AppData\\Roaming\\svchosts.exe" svchosts.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1240 set thread context of 2680 1240 crack2013.exe 30 PID 2340 set thread context of 2208 2340 svchosts.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crack2013.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crack2013.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchosts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchosts.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1240 crack2013.exe 2340 svchosts.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1240 wrote to memory of 2680 1240 crack2013.exe 30 PID 1240 wrote to memory of 2680 1240 crack2013.exe 30 PID 1240 wrote to memory of 2680 1240 crack2013.exe 30 PID 1240 wrote to memory of 2680 1240 crack2013.exe 30 PID 1240 wrote to memory of 2680 1240 crack2013.exe 30 PID 1240 wrote to memory of 2680 1240 crack2013.exe 30 PID 1240 wrote to memory of 2680 1240 crack2013.exe 30 PID 1240 wrote to memory of 2680 1240 crack2013.exe 30 PID 1240 wrote to memory of 2680 1240 crack2013.exe 30 PID 1240 wrote to memory of 2680 1240 crack2013.exe 30 PID 1240 wrote to memory of 2680 1240 crack2013.exe 30 PID 1240 wrote to memory of 2680 1240 crack2013.exe 30 PID 1240 wrote to memory of 2680 1240 crack2013.exe 30 PID 2680 wrote to memory of 2340 2680 crack2013.exe 31 PID 2680 wrote to memory of 2340 2680 crack2013.exe 31 PID 2680 wrote to memory of 2340 2680 crack2013.exe 31 PID 2680 wrote to memory of 2340 2680 crack2013.exe 31 PID 2680 wrote to memory of 2340 2680 crack2013.exe 31 PID 2680 wrote to memory of 2340 2680 crack2013.exe 31 PID 2680 wrote to memory of 2340 2680 crack2013.exe 31 PID 2340 wrote to memory of 2208 2340 svchosts.exe 32 PID 2340 wrote to memory of 2208 2340 svchosts.exe 32 PID 2340 wrote to memory of 2208 2340 svchosts.exe 32 PID 2340 wrote to memory of 2208 2340 svchosts.exe 32 PID 2340 wrote to memory of 2208 2340 svchosts.exe 32 PID 2340 wrote to memory of 2208 2340 svchosts.exe 32 PID 2340 wrote to memory of 2208 2340 svchosts.exe 32 PID 2340 wrote to memory of 2208 2340 svchosts.exe 32 PID 2340 wrote to memory of 2208 2340 svchosts.exe 32 PID 2340 wrote to memory of 2208 2340 svchosts.exe 32 PID 2340 wrote to memory of 2208 2340 svchosts.exe 32 PID 2340 wrote to memory of 2208 2340 svchosts.exe 32 PID 2340 wrote to memory of 2208 2340 svchosts.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\crack2013.exe"C:\Users\Admin\AppData\Local\Temp\crack2013.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\crack2013.exe"C:\Users\Admin\AppData\Local\Temp\crack2013.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Roaming\svchosts.exe"C:\Users\Admin\AppData\Roaming\svchosts.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Roaming\svchosts.exe"C:\Users\Admin\AppData\Roaming\svchosts.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2208
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-4177215427-74451935-3209572229-1000\88603cb2913a7df3fbd16b5f958e6447_bf99bef1-312f-4726-8597-70228ef05e99
Filesize51B
MD55fc2ac2a310f49c14d195230b91a8885
SHA190855cc11136ba31758fe33b5cf9571f9a104879
SHA256374e0e2897a7a82e0e44794cad89df0f3cdd7703886239c1fe06d625efd48092
SHA512ab46554df9174b9fe9beba50a640f67534c3812f64d96a1fb8adfdc136dfe730ca2370825cd45b7f87a544d6a58dd868cb5a3a7f42e2789f6d679dbc0fdd52c3
-
Filesize
140KB
MD57282ad47419c55f6e560a68d16dee2c4
SHA1113b4bd76ebd874304728d5a879b1fb06058140e
SHA256a4f862066ca5fae36faef0167f2a919637797869c6b338b1ec3e0f9a56af21f1
SHA5124f576308f64895c6cc8ac75485ddf8dacffdf5fc85318e8d8fa3bc4d1e3d636c0686106d5b0c3cf5b0dc88df4b5984f535a6a8a0b6f25649d05dce1df2f9fadc