Analysis
-
max time kernel
8s -
max time network
11s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2025, 11:25
Behavioral task
behavioral1
Sample
CrackLauncher.exe
Resource
win10v2004-20250217-en
General
-
Target
CrackLauncher.exe
-
Size
602KB
-
MD5
3f130f5434b8e3f910ed4728752d0d90
-
SHA1
25451b8025d529012b81e38493c42c682337b148
-
SHA256
c3d4c0d6d8bdb25a0982bb01524aea9383f4c2cfbfebdbca2982594f6d675032
-
SHA512
63eceae915c2c7a69c2c8238d55fc595e01971ba207d7a853617cd75040bb6542228a73cd0946174bdd380f541a072efb1d01ae674182155f76cb98672330e75
-
SSDEEP
12288:YkHpR0q8/RBgTmBbbFHOyml6bmqNjIabY1IY6QcBo:Nqp4xqd3o
Malware Config
Extracted
xworm
funds-skating.gl.at.ply.gg:28367
-
Install_directory
%Userprofile%
-
install_file
svchost.exe
Signatures
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral1/files/0x000c000000023b6d-19.dat family_xworm behavioral1/memory/2712-28-0x0000000000DD0000-0x0000000000DEC000-memory.dmp family_xworm behavioral1/memory/1080-27-0x0000000000400000-0x000000000049E000-memory.dmp family_xworm -
Xworm family
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1170604239-850860757-3112005715-1000\Control Panel\International\Geo\Nation CrackLauncher.exe -
Executes dropped EXE 2 IoCs
pid Process 1572 Launcher.exe 2712 Nursultan.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 25 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CrackLauncher.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4740 timeout.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2712 Nursultan.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1080 wrote to memory of 2096 1080 CrackLauncher.exe 86 PID 1080 wrote to memory of 2096 1080 CrackLauncher.exe 86 PID 1080 wrote to memory of 2096 1080 CrackLauncher.exe 86 PID 1080 wrote to memory of 1572 1080 CrackLauncher.exe 88 PID 1080 wrote to memory of 1572 1080 CrackLauncher.exe 88 PID 1080 wrote to memory of 2712 1080 CrackLauncher.exe 89 PID 1080 wrote to memory of 2712 1080 CrackLauncher.exe 89 PID 2096 wrote to memory of 4740 2096 cmd.exe 91 PID 2096 wrote to memory of 4740 2096 cmd.exe 91 PID 2096 wrote to memory of 4740 2096 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\CrackLauncher.exe"C:\Users\Admin\AppData\Local\Temp\CrackLauncher.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\CrackLauncher.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\timeout.exetimeout /t 12 /nobreak3⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4740
-
-
-
C:\Users\Admin\AppData\Local\Temp\Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Launcher.exe"2⤵
- Executes dropped EXE
PID:1572
-
-
C:\Users\Admin\AppData\Local\Temp\Nursultan.exe"C:\Users\Admin\AppData\Local\Temp\Nursultan.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
186B
MD5bd080aac681b6d277b9abade0e053340
SHA1356d4c54a54d4343348213dd653ef58bc451f5bf
SHA256b8b9073d34a3df97614c03937ecbaa34259de78d6c9ef70122ba41c439e1600d
SHA5129439e149bb46c71423248cc15aaf7cae871f90099a730ada4a4b19b0e5ba3a1cf62354851308684ed3561a83f9f35c9db9c121a314556ab395d9e565b8d07220
-
Filesize
505KB
MD5b8ecdac56c62fd3e55b68f611a90c534
SHA11b852b195958f6014accfbbbbfa7ebe64528b7fe
SHA25639f5483eb257469ed9a4298450337307657e534b0eebe16f2013ddd036829657
SHA5121fbc46fcf3319b5dc5edc4151f143356782db28c623b82edca2ee107c1993f5d737edfba27a5d4d0055d903ffd26129509340461fa5e2742a70437b8b552d511
-
Filesize
87KB
MD5aea5282ca4a36a0dd67fc1c00ec043b7
SHA151876aae1bb2361cd9b3087b3324fe71f588d46a
SHA25644132534c8a05d0f000885b1a5c4561c31d7930bc378b635b902633338a31863
SHA5127e6bb82bc6d0c1b1ec3d09b59a00c578f7229649cc67e99b0b38bfbf12c58bc0a60a9b62128da779e38e2b9b5894db9bebe88fc9ef606b0842646b3e1ec7ec8f