Analysis
-
max time kernel
34s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
04/03/2025, 14:34
Static task
static1
Behavioral task
behavioral1
Sample
CrackLauncher.exe
Resource
win10v2004-20250217-en
General
-
Target
CrackLauncher.exe
-
Size
76KB
-
MD5
eaf8bead81874b59ed1e17761dcda97a
-
SHA1
c449a6daae2900b66d8490b29793974ccc42adaa
-
SHA256
b09cb3790f8d27dedc636d2bb8532a94fddaf88a9428e17be30b31a3b742b2f2
-
SHA512
cdeda053b0fb2e526c943acb95696b5c9e577ea50a7871a5aa30830dc9fd25ede7d826139096c9669a193bbd3dfa0e5b72857c5857f0c1725d91a19184f60be9
-
SSDEEP
1536:UQFZgCR8ZPMhcNi1ptY8353R6L5ph64yJ3We9Gq:bLRbPR6L5ph6JJ3We99
Malware Config
Extracted
xworm
5.0
ideas-equation.gl.at.ply.gg:13038
Sdytd3eRdcISYTKJ
-
Install_directory
%AppData%
-
install_file
dawas.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/files/0x000200000001e72b-26.dat family_xworm behavioral1/memory/3728-34-0x0000000000EE0000-0x0000000000EF2000-memory.dmp family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3348 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\Control Panel\International\Geo\Nation CrackLauncher.exe -
Executes dropped EXE 1 IoCs
pid Process 3728 NurikCrack1.16.5.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2278412438-3475196406-3686434223-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NurikCrack1.16.5 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NurikCrack1.16.5.exe" CrackLauncher.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 29 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3348 powershell.exe 3348 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3348 powershell.exe Token: SeDebugPrivilege 3728 NurikCrack1.16.5.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4524 wrote to memory of 3280 4524 CrackLauncher.exe 91 PID 4524 wrote to memory of 3280 4524 CrackLauncher.exe 91 PID 4524 wrote to memory of 3348 4524 CrackLauncher.exe 92 PID 4524 wrote to memory of 3348 4524 CrackLauncher.exe 92 PID 4524 wrote to memory of 3728 4524 CrackLauncher.exe 97 PID 4524 wrote to memory of 3728 4524 CrackLauncher.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\CrackLauncher.exe"C:\Users\Admin\AppData\Local\Temp\CrackLauncher.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\CrackLauncher.exe"C:\Users\Admin\AppData\Local\Temp\CrackLauncher.exe"2⤵PID:3280
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\NurikCrack1.16.5.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3348
-
-
C:\Users\Admin\AppData\Local\Temp\NurikCrack1.16.5.exe"C:\Users\Admin\AppData\Local\Temp\NurikCrack1.16.5.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42B
MD584cfdb4b995b1dbf543b26b86c863adc
SHA1d2f47764908bf30036cf8248b9ff5541e2711fa2
SHA256d8988d672d6915b46946b28c06ad8066c50041f6152a91d37ffa5cf129cc146b
SHA512485f0ed45e13f00a93762cbf15b4b8f996553baa021152fae5aba051e3736bcd3ca8f4328f0e6d9e3e1f910c96c4a9ae055331123ee08e3c2ce3a99ac2e177ce
-
Filesize
44KB
MD5b738126406c02253ee779ac205d9174e
SHA170dc9f77f20777184df051201ab4eb6ae23fdd58
SHA256b3d74f6ae903c8e60a8bc30315e3cbb5734577c3297ee3df2cd619b16d5884e3
SHA512c26dac50200e66a9810817ac6a6b56c9a82b5ddb58a018681d7ff486ec0dccb5867349915d583ed9725a793fd707e5e1f5a2b01a2f3d9909e11207747373bfa9
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82