Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-03-2023 13:48
Static task
static1
Behavioral task
behavioral1
Sample
lan.zip
Resource
win10v2004-20230220-en
Behavioral task
behavioral2
Sample
ILMerge.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
Luxury Shield.exe
Resource
win10v2004-20230220-en
General
-
Target
Luxury Shield.exe
-
Size
17.1MB
-
MD5
be0d52d163806c824bdbcf4fdae1c1cb
-
SHA1
f7421212d0757563a8f5faa95ba148439884523d
-
SHA256
37bd9f4d88ff52c03a663d4a4bfbe2fcfc3232b854b3b56ef41116f522373a87
-
SHA512
8d4c66fb37ac46ac64f82b198e499f344960ca40386970b50538cc5d1c07a92b299cb04d05c37c4018ee5108ed8d2509694bd3b93f43cd70afa03b1350c21065
-
SSDEEP
196608:4dY4ohMRfIGA5v68+v+D+r+pqpvJiADKMxE9EPTVIchOXC:+YhhHJ6SqpvfDlxE9yVeC
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
Processes:
Luxury Shield.exepid process 2984 Luxury Shield.exe -
Obfuscated with Agile.Net obfuscator 32 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral3/memory/2984-149-0x00000000085F0000-0x0000000008838000-memory.dmp agile_net behavioral3/memory/2984-151-0x00000000085F0000-0x0000000008838000-memory.dmp agile_net behavioral3/memory/2984-153-0x00000000085F0000-0x0000000008838000-memory.dmp agile_net behavioral3/memory/2984-155-0x00000000085F0000-0x0000000008838000-memory.dmp agile_net behavioral3/memory/2984-157-0x00000000085F0000-0x0000000008838000-memory.dmp agile_net behavioral3/memory/2984-159-0x00000000085F0000-0x0000000008838000-memory.dmp agile_net behavioral3/memory/2984-161-0x00000000085F0000-0x0000000008838000-memory.dmp agile_net behavioral3/memory/2984-163-0x00000000085F0000-0x0000000008838000-memory.dmp agile_net behavioral3/memory/2984-165-0x00000000085F0000-0x0000000008838000-memory.dmp agile_net behavioral3/memory/2984-167-0x00000000085F0000-0x0000000008838000-memory.dmp agile_net behavioral3/memory/2984-169-0x00000000085F0000-0x0000000008838000-memory.dmp agile_net behavioral3/memory/2984-171-0x00000000085F0000-0x0000000008838000-memory.dmp agile_net behavioral3/memory/2984-173-0x00000000085F0000-0x0000000008838000-memory.dmp agile_net behavioral3/memory/2984-175-0x00000000085F0000-0x0000000008838000-memory.dmp agile_net behavioral3/memory/2984-177-0x00000000085F0000-0x0000000008838000-memory.dmp agile_net behavioral3/memory/2984-179-0x00000000085F0000-0x0000000008838000-memory.dmp agile_net behavioral3/memory/2984-181-0x00000000085F0000-0x0000000008838000-memory.dmp agile_net behavioral3/memory/2984-183-0x00000000085F0000-0x0000000008838000-memory.dmp agile_net behavioral3/memory/2984-185-0x00000000085F0000-0x0000000008838000-memory.dmp agile_net behavioral3/memory/2984-187-0x00000000085F0000-0x0000000008838000-memory.dmp agile_net behavioral3/memory/2984-189-0x00000000085F0000-0x0000000008838000-memory.dmp agile_net behavioral3/memory/2984-191-0x00000000085F0000-0x0000000008838000-memory.dmp agile_net behavioral3/memory/2984-193-0x00000000085F0000-0x0000000008838000-memory.dmp agile_net behavioral3/memory/2984-195-0x00000000085F0000-0x0000000008838000-memory.dmp agile_net behavioral3/memory/2984-197-0x00000000085F0000-0x0000000008838000-memory.dmp agile_net behavioral3/memory/2984-199-0x00000000085F0000-0x0000000008838000-memory.dmp agile_net behavioral3/memory/2984-201-0x00000000085F0000-0x0000000008838000-memory.dmp agile_net behavioral3/memory/2984-203-0x00000000085F0000-0x0000000008838000-memory.dmp agile_net behavioral3/memory/2984-205-0x00000000085F0000-0x0000000008838000-memory.dmp agile_net behavioral3/memory/2984-207-0x00000000085F0000-0x0000000008838000-memory.dmp agile_net behavioral3/memory/2984-209-0x00000000085F0000-0x0000000008838000-memory.dmp agile_net behavioral3/memory/2984-211-0x00000000085F0000-0x0000000008838000-memory.dmp agile_net -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Luxury Shield.exedescription pid process Token: SeDebugPrivilege 2984 Luxury Shield.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
Luxury Shield.exepid process 2984 Luxury Shield.exe 2984 Luxury Shield.exe
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD59af5eb006bb0bab7f226272d82c896c7
SHA1c2a5bb42a5f08f4dc821be374b700652262308f0
SHA25677dc05a6bda90757f66552ee3f469b09f1e00732b4edca0f542872fb591ed9db
SHA5127badd41be4c1039302fda9bba19d374ec9446ce24b7db33b66bee4ef38180d1abcd666d2aea468e7e452aa1e1565eedfefed582bf1c2fe477a4171d99d48772a
-
Filesize
136KB
MD59af5eb006bb0bab7f226272d82c896c7
SHA1c2a5bb42a5f08f4dc821be374b700652262308f0
SHA25677dc05a6bda90757f66552ee3f469b09f1e00732b4edca0f542872fb591ed9db
SHA5127badd41be4c1039302fda9bba19d374ec9446ce24b7db33b66bee4ef38180d1abcd666d2aea468e7e452aa1e1565eedfefed582bf1c2fe477a4171d99d48772a
-
Filesize
37KB
MD5871b31793a538de46b8ffaf916a5080b
SHA10f239aa4f2a6cd8a69d5cc71e0c05601c80b62d0
SHA25608a5aa42ebf8c0cd1aef8d76a0227e919c5f70f54c3c246dd53bc2e91ef14d53
SHA5121b9972a665fd4783b17ed63a9cf2d84fdd5294c72592e0412e53454b744eb07e8a73184ba153e85feacc38178b062d014067f1cfa52e265a193d0df61a1fb057
-
Filesize
15KB
MD5f3040d44a71f07e4117dbf0755391d90
SHA1099fb8bbb44b1d83b9c0e942d3530870c32ffc47
SHA256590538e3897a340f3e9549155f93152afaf378d2cbee8027d3fb23bf5265a475
SHA51220385d05d2701a101069f760a1ca09cd8fc332daf4000c0d4e9e35d0d5d647c0cc7197e6a52ec796644f5fd5d9f3e07d2d54ea311633ce0c7ea44cb9f0df877a