Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
12-07-2023 05:57
Behavioral task
behavioral1
Sample
a38ae8a1930668deab4303643fa01807.exe
Resource
win7-20230703-en
windows7-x64
11 signatures
150 seconds
General
-
Target
a38ae8a1930668deab4303643fa01807.exe
-
Size
3.1MB
-
MD5
a38ae8a1930668deab4303643fa01807
-
SHA1
36db91eaf9927c112e3ee2226dddae9e79e02562
-
SHA256
3dff203bab1db4bd7012e5daa23e467f7919587e5a306e497edb85caa2497dbe
-
SHA512
8f9d91bbd31f3873b3f3d9bdf6572986fb18c4a8d6b536f450e15c548f8e009850fece4804267a16e4c7a457a1de6e5ba620efa4d86c8058a82fb6139181de25
-
SSDEEP
49152:Q87rM76glSA2JVgP9Fr308sWf379GGe4/9RJGV21mAwXm1PF+B0jzqCS:5e6gp2Lg/0Lu3JD1RJ+qmAwqF+UqCS
Malware Config
Extracted
Family
lumma
C2
gstatic-node.io
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
a38ae8a1930668deab4303643fa01807.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a38ae8a1930668deab4303643fa01807.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
a38ae8a1930668deab4303643fa01807.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a38ae8a1930668deab4303643fa01807.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a38ae8a1930668deab4303643fa01807.exe -
Processes:
resource yara_rule behavioral2/memory/2944-137-0x0000000000270000-0x0000000000962000-memory.dmp themida behavioral2/memory/2944-170-0x0000000000270000-0x0000000000962000-memory.dmp themida -
Processes:
a38ae8a1930668deab4303643fa01807.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA a38ae8a1930668deab4303643fa01807.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
a38ae8a1930668deab4303643fa01807.exepid process 2944 a38ae8a1930668deab4303643fa01807.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
a38ae8a1930668deab4303643fa01807.exedescription pid process target process PID 2944 set thread context of 3420 2944 a38ae8a1930668deab4303643fa01807.exe AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
a38ae8a1930668deab4303643fa01807.exepid process 2944 a38ae8a1930668deab4303643fa01807.exe 2944 a38ae8a1930668deab4303643fa01807.exe 2944 a38ae8a1930668deab4303643fa01807.exe 2944 a38ae8a1930668deab4303643fa01807.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a38ae8a1930668deab4303643fa01807.exedescription pid process Token: SeDebugPrivilege 2944 a38ae8a1930668deab4303643fa01807.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
a38ae8a1930668deab4303643fa01807.exedescription pid process target process PID 2944 wrote to memory of 2196 2944 a38ae8a1930668deab4303643fa01807.exe AppLaunch.exe PID 2944 wrote to memory of 2196 2944 a38ae8a1930668deab4303643fa01807.exe AppLaunch.exe PID 2944 wrote to memory of 2196 2944 a38ae8a1930668deab4303643fa01807.exe AppLaunch.exe PID 2944 wrote to memory of 3420 2944 a38ae8a1930668deab4303643fa01807.exe AppLaunch.exe PID 2944 wrote to memory of 3420 2944 a38ae8a1930668deab4303643fa01807.exe AppLaunch.exe PID 2944 wrote to memory of 3420 2944 a38ae8a1930668deab4303643fa01807.exe AppLaunch.exe PID 2944 wrote to memory of 3420 2944 a38ae8a1930668deab4303643fa01807.exe AppLaunch.exe PID 2944 wrote to memory of 3420 2944 a38ae8a1930668deab4303643fa01807.exe AppLaunch.exe PID 2944 wrote to memory of 3420 2944 a38ae8a1930668deab4303643fa01807.exe AppLaunch.exe PID 2944 wrote to memory of 3420 2944 a38ae8a1930668deab4303643fa01807.exe AppLaunch.exe PID 2944 wrote to memory of 3420 2944 a38ae8a1930668deab4303643fa01807.exe AppLaunch.exe PID 2944 wrote to memory of 3420 2944 a38ae8a1930668deab4303643fa01807.exe AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a38ae8a1930668deab4303643fa01807.exe"C:\Users\Admin\AppData\Local\Temp\a38ae8a1930668deab4303643fa01807.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:2196
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:3420
-