Analysis
-
max time kernel
13s -
max time network
14s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2025, 11:24
General
-
Target
CrackLauncher.exe
-
Size
602KB
-
MD5
3f130f5434b8e3f910ed4728752d0d90
-
SHA1
25451b8025d529012b81e38493c42c682337b148
-
SHA256
c3d4c0d6d8bdb25a0982bb01524aea9383f4c2cfbfebdbca2982594f6d675032
-
SHA512
63eceae915c2c7a69c2c8238d55fc595e01971ba207d7a853617cd75040bb6542228a73cd0946174bdd380f541a072efb1d01ae674182155f76cb98672330e75
-
SSDEEP
12288:YkHpR0q8/RBgTmBbbFHOyml6bmqNjIabY1IY6QcBo:Nqp4xqd3o
Malware Config
Extracted
xworm
funds-skating.gl.at.ply.gg:28367
-
Install_directory
%Userprofile%
-
install_file
svchost.exe
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral1/memory/1296-27-0x0000000000400000-0x000000000049E000-memory.dmp family_xworm behavioral1/files/0x0007000000023c9c-26.dat family_xworm behavioral1/memory/5452-28-0x0000000000590000-0x00000000005AC000-memory.dmp family_xworm -
Xworm family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1294999112-580688058-1763548717-1000\Control Panel\International\Geo\Nation CrackLauncher.exe -
Executes dropped EXE 2 IoCs
pid Process 2312 Launcher.exe 5452 Nursultan.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 25 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CrackLauncher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 5936 timeout.exe 5984 timeout.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5452 Nursultan.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1296 wrote to memory of 1056 1296 CrackLauncher.exe 85 PID 1296 wrote to memory of 1056 1296 CrackLauncher.exe 85 PID 1296 wrote to memory of 1056 1296 CrackLauncher.exe 85 PID 1296 wrote to memory of 2312 1296 CrackLauncher.exe 88 PID 1296 wrote to memory of 2312 1296 CrackLauncher.exe 88 PID 1296 wrote to memory of 5452 1296 CrackLauncher.exe 89 PID 1296 wrote to memory of 5452 1296 CrackLauncher.exe 89 PID 1056 wrote to memory of 5936 1056 cmd.exe 91 PID 1056 wrote to memory of 5936 1056 cmd.exe 91 PID 1056 wrote to memory of 5936 1056 cmd.exe 91 PID 1056 wrote to memory of 5984 1056 cmd.exe 106 PID 1056 wrote to memory of 5984 1056 cmd.exe 106 PID 1056 wrote to memory of 5984 1056 cmd.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\CrackLauncher.exe"C:\Users\Admin\AppData\Local\Temp\CrackLauncher.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CrackLauncher.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\timeout.exetimeout /t 12 /nobreak3⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5936
-
-
C:\Windows\SysWOW64\timeout.exetimeout /t 6 /nobreak3⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5984
-
-
-
C:\Users\Admin\AppData\Local\Temp\Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Launcher.exe"2⤵
- Executes dropped EXE
PID:2312
-
-
C:\Users\Admin\AppData\Local\Temp\Nursultan.exe"C:\Users\Admin\AppData\Local\Temp\Nursultan.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
186B
MD5bd080aac681b6d277b9abade0e053340
SHA1356d4c54a54d4343348213dd653ef58bc451f5bf
SHA256b8b9073d34a3df97614c03937ecbaa34259de78d6c9ef70122ba41c439e1600d
SHA5129439e149bb46c71423248cc15aaf7cae871f90099a730ada4a4b19b0e5ba3a1cf62354851308684ed3561a83f9f35c9db9c121a314556ab395d9e565b8d07220
-
Filesize
505KB
MD5b8ecdac56c62fd3e55b68f611a90c534
SHA11b852b195958f6014accfbbbbfa7ebe64528b7fe
SHA25639f5483eb257469ed9a4298450337307657e534b0eebe16f2013ddd036829657
SHA5121fbc46fcf3319b5dc5edc4151f143356782db28c623b82edca2ee107c1993f5d737edfba27a5d4d0055d903ffd26129509340461fa5e2742a70437b8b552d511
-
Filesize
87KB
MD5aea5282ca4a36a0dd67fc1c00ec043b7
SHA151876aae1bb2361cd9b3087b3324fe71f588d46a
SHA25644132534c8a05d0f000885b1a5c4561c31d7930bc378b635b902633338a31863
SHA5127e6bb82bc6d0c1b1ec3d09b59a00c578f7229649cc67e99b0b38bfbf12c58bc0a60a9b62128da779e38e2b9b5894db9bebe88fc9ef606b0842646b3e1ec7ec8f