Analysis

  • max time kernel
    77s
  • max time network
    81s
  • platform
    windows10-1703_x64
  • resource
    win10-20230621-es
  • resource tags

    arch:x64arch:x86image:win10-20230621-eslocale:es-esos:windows10-1703-x64systemwindows
  • submitted
    30/06/2023, 20:37

Errors

Reason
Machine shutdown

General

  • Target

    lul.exe

  • Size

    168KB

  • MD5

    0ea845b5913d50f462d1d771cc473d18

  • SHA1

    ac838713ec6a73a63567eaa81fdc4d1b74c91f35

  • SHA256

    dc723bceb6f383f32cfdb374a454a9ce006398748f96346430587868a43ac28f

  • SHA512

    8a18d6d7dd5e805cb40ea296be7b13b5de8621753f004d155015e119a3d4830b8d03837558dcc5fb539b01bdf5a429a126594d8268b87253d186a38aaf3dca76

  • SSDEEP

    3072:BMobR7ezAjLOZvmX1h5KtiC+ESAShLbsISLei3Fh0:2eR7eammMth+ZLL4Z

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 1 IoCs
  • Modifies registry key 1 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\lul.exe
    "C:\Users\Admin\AppData\Local\Temp\lul.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3216
    • C:\Windows\SYSTEM32\cmd.exe
      cmd.exe /c s.bat
      2⤵
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3784
      • C:\Windows\system32\shutdown.exe
        shutdown -s -t 68 -c ":D"
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4932
      • C:\Windows\system32\winver.exe
        winver.exe
        3⤵
          PID:4436
        • C:\Windows\System32\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\msg.vbs"
          3⤵
            PID:4140
          • C:\Windows\system32\rundll32.exe
            RUNDLL32 USER32.DLL,SwapMouseButton
            3⤵
              PID:4160
            • C:\Windows\system32\reg.exe
              reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v AVAADA /t REG_SZ /d C:\Windows\s.bat /f
              3⤵
              • Adds Run key to start application
              • Modifies registry key
              PID:2232
            • C:\Windows\system32\reg.exe
              reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v AVAADA /t REG_SZ /d C:\Windows\s.bat /f
              3⤵
              • Adds Run key to start application
              • Modifies registry key
              PID:4036
            • C:\Windows\system32\ipconfig.exe
              Ipconfig / release
              3⤵
              • Gathers network information
              PID:4664
        • C:\Windows\system32\LogonUI.exe
          "LogonUI.exe" /flags:0x0 /state0:0xa3acf055 /state1:0x41c64e6d
          1⤵
          • Modifies data under HKEY_USERS
          • Suspicious use of SetWindowsHookEx
          PID:2860

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\msg.vbs

          Filesize

          24B

          MD5

          74d9c5d0cff2544b485c33a94ca0c57d

          SHA1

          a2432860b321ff8a0c145ac98a814c3bfb49a284

          SHA256

          602b849d9f0d45cd95a24ecd92057b119340798844485ee444dce96dd3b3398e

          SHA512

          73a38fdeb96c643501709b8a91b1fcab62e1b817cfed4a9e3fbe1990be2383003051ed52bee0da5a6cd0f9f02d03416c9cb060f97629d90513c12a70fdb9c1b3

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s.bat

          Filesize

          9KB

          MD5

          04cb1ca14b01520e75569255a90495bf

          SHA1

          e509df382c8d906a0d3b03abfc17ad97ae8c01a8

          SHA256

          1f8d5657af51e4bf5eb54f4c1f2478b83c80d338e7d6d7759483925108ab67d2

          SHA512

          9d9b36054c6f0bf963acf7bedfad1396d9f7c4fb52011cf4b199bf56bf1a4fbeab705b1382401b616cebd8bd53b2a548c132ad86f0396d06dcaebc95093eedcf