Analysis

  • max time kernel
    496s
  • max time network
    403s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    23-03-2021 08:03

General

  • Target

    LavaCraft.exe

  • Size

    1.3MB

  • MD5

    8609e5d84c7149a6addfa9b4dc991a47

  • SHA1

    945dbacb3ee32fe07e8058c03b3ea2f3f78dec83

  • SHA256

    9722e6e82f7ac47686931a1e90e8dff0d536e08ff934286da737572ea2e1f8a3

  • SHA512

    56d16bf56fb0e5e2a0b1524b2352cb4bdb9671dbf1c096744f806ef62bc49f4426c1359a9b0e427981ed89a4c1121241a0b69346bbff624b7ecd079a68b00134

Malware Config

Signatures

  • Executes dropped EXE 5 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 35 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Windows directory 50 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 16 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates processes with tasklist 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\LavaCraft.exe
    "C:\Users\Admin\AppData\Local\Temp\LavaCraft.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1316
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\.LavaServer\run.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1984
      • C:\Windows\system32\tasklist.exe
        tasklist /FI "IMAGENAME eq LavaCraft.exe" /NH
        3⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:812
      • C:\Windows\system32\findstr.exe
        findstr /i "LavaCraft.exe"
        3⤵
          PID:1864
        • C:\Windows\system32\tasklist.exe
          tasklist /FI "IMAGENAME eq LavaCraft.exe" /NH
          3⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:2520
        • C:\Windows\system32\findstr.exe
          findstr /i "LavaCraft.exe"
          3⤵
            PID:3668
          • C:\Windows\system32\tasklist.exe
            tasklist /FI "IMAGENAME eq LavaCraft.exe" /NH
            3⤵
            • Enumerates processes with tasklist
            • Suspicious use of AdjustPrivilegeToken
            PID:1768
          • C:\Windows\system32\findstr.exe
            findstr /i "LavaCraft.exe"
            3⤵
              PID:2100
            • C:\Windows\system32\tasklist.exe
              tasklist /FI "IMAGENAME eq LavaCraft.exe" /NH
              3⤵
              • Enumerates processes with tasklist
              • Suspicious use of AdjustPrivilegeToken
              PID:4092
            • C:\Windows\system32\findstr.exe
              findstr /i "LavaCraft.exe"
              3⤵
                PID:3964
              • C:\Users\Admin\AppData\Roaming\.LavaServer\LavaCraft.exe
                "C:\Users\Admin\AppData\Roaming\.LavaServer\LavaCraft.exe" "C:\Users\Admin\AppData\Local\Temp\LavaCraft.exe"
                3⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Writes to the Master Boot Record (MBR)
                • Drops file in Windows directory
                • Checks SCSI registry key(s)
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2584
                • C:\Users\Admin\AppData\Roaming\.LavaServer\7za.exe
                  "C:\Users\Admin\AppData\Roaming\.LavaServer\7za.exe" x -r "C:\Users\Admin\AppData\Roaming\.LavaServer\java64.zip" -o"C:\Users\Admin\AppData\Roaming\.LavaServer\java"
                  4⤵
                  • Executes dropped EXE
                  PID:2500
                • C:\Users\Admin\AppData\Roaming\.LavaServer\java\bin\javaw.exe
                  "C:\Users\Admin\AppData\Roaming\.LavaServer\java\bin\javaw.exe" -XX:+DisableAttachMechanism -Xms512m -Xmx1024m -cp "C:\Users\Admin\AppData\Roaming\.LavaServer\lavacraft6\bin\minecraft.jar;C:\Users\Admin\AppData\Roaming\.LavaServer\lavacraft6\bin\jinput.jar;C:\Users\Admin\AppData\Roaming\.LavaServer\lavacraft6\bin\lwjgl.jar;C:\Users\Admin\AppData\Roaming\.LavaServer\lavacraft6\bin\lwjgl_util.jar" -Djava.library.path="C:\Users\Admin\AppData\Roaming\.LavaServer\lavacraft6\bin\natives" net.minecraft.client.Minecraft Krevetka260 17965171191896505146337618375718292 195.201.156.42 25569 6 http://lavacraft.ru::beget=begetok http://img.lavacraft.ru
                  4⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetWindowsHookEx
                  PID:1712
          • C:\Windows\System32\GameBarPresenceWriter.exe
            "C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer
            1⤵
              PID:648
            • C:\Windows\System32\GamePanel.exe
              "C:\Windows\System32\GamePanel.exe" 000000000002024A /startuptips
              1⤵
              • Checks SCSI registry key(s)
              PID:2116
            • C:\Windows\System32\bcastdvr.exe
              "C:\Windows\System32\bcastdvr.exe" -ServerName:Windows.Media.Capture.Internal.BroadcastDVRServer
              1⤵
              • Drops desktop.ini file(s)
              • Checks processor information in registry
              PID:640
            • C:\Users\Admin\AppData\Roaming\.LavaServer\LavaCraft.exe
              "C:\Users\Admin\AppData\Roaming\.LavaServer\LavaCraft.exe"
              1⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Writes to the Master Boot Record (MBR)
              • Checks SCSI registry key(s)
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2276
              • C:\Users\Admin\AppData\Roaming\.LavaServer\java\bin\javaw.exe
                "C:\Users\Admin\AppData\Roaming\.LavaServer\java\bin\javaw.exe" -XX:+DisableAttachMechanism -Xms512m -Xmx1024m -cp "C:\Users\Admin\AppData\Roaming\.LavaServer\lavacraft6\bin\minecraft.jar;C:\Users\Admin\AppData\Roaming\.LavaServer\lavacraft6\bin\jinput.jar;C:\Users\Admin\AppData\Roaming\.LavaServer\lavacraft6\bin\lwjgl.jar;C:\Users\Admin\AppData\Roaming\.LavaServer\lavacraft6\bin\lwjgl_util.jar" -Djava.library.path="C:\Users\Admin\AppData\Roaming\.LavaServer\lavacraft6\bin\natives" net.minecraft.client.Minecraft Krevetka260 182530690721203151565 195.201.156.42 25569 6 http://lavacraft.ru::beget=begetok http://img.lavacraft.ru
                2⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:184
            • C:\Windows\System32\GameBarPresenceWriter.exe
              "C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer
              1⤵
                PID:1360
              • C:\Windows\System32\GamePanel.exe
                "C:\Windows\System32\GamePanel.exe" 00000000000501DE /startuptips
                1⤵
                • Checks SCSI registry key(s)
                PID:1128

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • memory/184-110-0x0000000002BD0000-0x0000000002E40000-memory.dmp

                Filesize

                2.4MB

              • memory/1316-8-0x000000001B2B2000-0x000000001B2B4000-memory.dmp

                Filesize

                8KB

              • memory/1316-7-0x000000001D120000-0x000000001D121000-memory.dmp

                Filesize

                4KB

              • memory/1316-6-0x000000001FE90000-0x000000001FE91000-memory.dmp

                Filesize

                4KB

              • memory/1316-5-0x000000001B2B0000-0x000000001B2B2000-memory.dmp

                Filesize

                8KB

              • memory/1316-4-0x000000001B2C0000-0x000000001B3AE000-memory.dmp

                Filesize

                952KB

              • memory/1316-3-0x0000000000630000-0x0000000000631000-memory.dmp

                Filesize

                4KB

              • memory/1316-2-0x00007FF8DA440000-0x00007FF8DAE2C000-memory.dmp

                Filesize

                9.9MB

              • memory/1712-62-0x0000000002B50000-0x0000000002DC0000-memory.dmp

                Filesize

                2.4MB

              • memory/2276-98-0x00007FF8DA440000-0x00007FF8DAE2C000-memory.dmp

                Filesize

                9.9MB

              • memory/2276-112-0x000000001AE79000-0x000000001AE7F000-memory.dmp

                Filesize

                24KB

              • memory/2276-111-0x000000001AE77000-0x000000001AE79000-memory.dmp

                Filesize

                8KB

              • memory/2276-107-0x0000000002540000-0x0000000002541000-memory.dmp

                Filesize

                4KB

              • memory/2276-106-0x000000001AE75000-0x000000001AE77000-memory.dmp

                Filesize

                8KB

              • memory/2276-104-0x000000001AE74000-0x000000001AE75000-memory.dmp

                Filesize

                4KB

              • memory/2276-105-0x000000001AE72000-0x000000001AE74000-memory.dmp

                Filesize

                8KB

              • memory/2276-101-0x000000001AE70000-0x000000001AE72000-memory.dmp

                Filesize

                8KB

              • memory/2584-23-0x00007FF8DA440000-0x00007FF8DAE2C000-memory.dmp

                Filesize

                9.9MB

              • memory/2584-97-0x000000001B367000-0x000000001B369000-memory.dmp

                Filesize

                8KB

              • memory/2584-32-0x000000001B365000-0x000000001B367000-memory.dmp

                Filesize

                8KB

              • memory/2584-28-0x000000001B362000-0x000000001B364000-memory.dmp

                Filesize

                8KB

              • memory/2584-29-0x000000001B364000-0x000000001B365000-memory.dmp

                Filesize

                4KB

              • memory/2584-26-0x000000001B360000-0x000000001B362000-memory.dmp

                Filesize

                8KB

              • memory/2584-35-0x0000000000DC0000-0x0000000000DC1000-memory.dmp

                Filesize

                4KB

              • memory/2584-61-0x0000000000FB0000-0x0000000000FB1000-memory.dmp

                Filesize

                4KB