Overview
overview
10Static
static
10Luxury Shi...UI.dll
windows7-x64
1Luxury Shi...UI.dll
windows10-2004-x64
1Luxury Shi...I2.dll
windows7-x64
1Luxury Shi...I2.dll
windows10-2004-x64
1Luxury Shi...ge.exe
windows7-x64
1Luxury Shi...ge.exe
windows10-2004-x64
1Luxury Shi...np.exe
windows7-x64
10Luxury Shi...np.exe
windows10-2004-x64
10Luxury Shi...ld.exe
windows7-x64
7Luxury Shi...ld.exe
windows10-2004-x64
7Luxury Shi...on.dll
windows7-x64
1Luxury Shi...on.dll
windows10-2004-x64
1Luxury Shi...on.dll
windows7-x64
1Luxury Shi...on.dll
windows10-2004-x64
1Analysis
-
max time kernel
34s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
20-08-2023 00:35
Behavioral task
behavioral1
Sample
Luxury Shield/Guna.UI.dll
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Luxury Shield/Guna.UI.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
Luxury Shield/Guna.UI2.dll
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
Luxury Shield/Guna.UI2.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
Luxury Shield/ILMerge.exe
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
Luxury Shield/ILMerge.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
Luxury Shield/Infected.pnggnp.exe
Resource
win7-20230712-en
Behavioral task
behavioral8
Sample
Luxury Shield/Infected.pnggnp.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral9
Sample
Luxury Shield/Luxury Shield.exe
Resource
win7-20230712-en
Behavioral task
behavioral10
Sample
Luxury Shield/Luxury Shield.exe
Resource
win10v2004-20230703-en
Behavioral task
behavioral11
Sample
Luxury Shield/Newtonsoft.Json.dll
Resource
win7-20230712-en
Behavioral task
behavioral12
Sample
Luxury Shield/Newtonsoft.Json.dll
Resource
win10v2004-20230703-en
Behavioral task
behavioral13
Sample
Luxury Shield/System.Web.Optimization.dll
Resource
win7-20230712-en
Behavioral task
behavioral14
Sample
Luxury Shield/System.Web.Optimization.dll
Resource
win10v2004-20230703-en
General
-
Target
Luxury Shield/Luxury Shield.exe
-
Size
6.1MB
-
MD5
40955751ffb3df0dd4cef5728cb0a2c5
-
SHA1
6219105ac9261fd9eedaf9eb103f2a856e43b4ba
-
SHA256
07c5f5c6595f9ccb544b2d78677fce86084b1821474216a6d3d3241701d4692c
-
SHA512
a9bf58a9ef3dbaf01fe42b00dbad3c0455dc9d2da78833a1c05bc98992722ed044d90529272dfaedb62d1c9d09b3336774b82015c74fdc9d1279596756639808
-
SSDEEP
196608:nUJ5nwUlVzBvx4DkwjdtBC5U45+YXGJPVc9hC:UJhfBv67d/C6YXGJdc9hC
Malware Config
Signatures
-
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
Processes:
resource yara_rule behavioral9/memory/2340-55-0x0000000006150000-0x00000000067C8000-memory.dmp net_reactor behavioral9/memory/2340-57-0x00000000067D0000-0x0000000006E46000-memory.dmp net_reactor -
Loads dropped DLL 1 IoCs
Processes:
Luxury Shield.exepid process 2340 Luxury Shield.exe -
Obfuscated with Agile.Net obfuscator 2 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral9/memory/2340-58-0x0000000006F60000-0x00000000071AC000-memory.dmp agile_net behavioral9/memory/2340-72-0x0000000008720000-0x0000000008820000-memory.dmp agile_net -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 20 IoCs
Processes:
Luxury Shield.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Luxury Shield.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell Luxury Shield.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Luxury Shield.exe Set value (data) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Luxury Shield.exe Set value (data) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff Luxury Shield.exe Set value (data) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Luxury Shield.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Luxury Shield.exe Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_FolderType = "{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}" Luxury Shield.exe Set value (data) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff Luxury Shield.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Luxury Shield.exe Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_TopViewVersion = "0" Luxury Shield.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_Classes\Local Settings Luxury Shield.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Luxury Shield.exe Set value (data) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Luxury Shield.exe Set value (int) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" Luxury Shield.exe Set value (str) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_TopViewID = "{82BA0782-5B7A-4569-B5D7-EC83085F08CC}" Luxury Shield.exe Set value (data) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f4225481e03947bc34db131e946b44c8dd50000 Luxury Shield.exe Set value (data) \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 9e0000001a00eebbfe23000010007db10d7bd29c934a973346cc89022e7c00002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020002a0000000000efbe7e47b3fbe4c93b4ba2bad3f5d3cd46f98207ba827a5b6945b5d7ec83085f08cc20002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020000000 Luxury Shield.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg Luxury Shield.exe Key created \REGISTRY\USER\S-1-5-21-722410544-1258951091-1992882075-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags Luxury Shield.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
Luxury Shield.exepid process 2340 Luxury Shield.exe 2340 Luxury Shield.exe 2340 Luxury Shield.exe 2340 Luxury Shield.exe 2340 Luxury Shield.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Luxury Shield.exepid process 2340 Luxury Shield.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Luxury Shield.exedescription pid process Token: SeDebugPrivilege 2340 Luxury Shield.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
Luxury Shield.exepid process 2340 Luxury Shield.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
Luxury Shield.exepid process 2340 Luxury Shield.exe 2340 Luxury Shield.exe 2340 Luxury Shield.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
Luxury Shield.exedescription pid process target process PID 2340 wrote to memory of 2004 2340 Luxury Shield.exe ILMerge.exe PID 2340 wrote to memory of 2004 2340 Luxury Shield.exe ILMerge.exe PID 2340 wrote to memory of 2004 2340 Luxury Shield.exe ILMerge.exe PID 2340 wrote to memory of 2004 2340 Luxury Shield.exe ILMerge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Luxury Shield\Luxury Shield.exe"C:\Users\Admin\AppData\Local\Temp\Luxury Shield\Luxury Shield.exe"1⤵
- Loads dropped DLL
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\Luxury Shield\ILMerge.exe"C:\Users\Admin\AppData\Local\Temp\Luxury Shield\ILMerge.exe"2⤵PID:2004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD59af5eb006bb0bab7f226272d82c896c7
SHA1c2a5bb42a5f08f4dc821be374b700652262308f0
SHA25677dc05a6bda90757f66552ee3f469b09f1e00732b4edca0f542872fb591ed9db
SHA5127badd41be4c1039302fda9bba19d374ec9446ce24b7db33b66bee4ef38180d1abcd666d2aea468e7e452aa1e1565eedfefed582bf1c2fe477a4171d99d48772a
-
Filesize
136KB
MD59af5eb006bb0bab7f226272d82c896c7
SHA1c2a5bb42a5f08f4dc821be374b700652262308f0
SHA25677dc05a6bda90757f66552ee3f469b09f1e00732b4edca0f542872fb591ed9db
SHA5127badd41be4c1039302fda9bba19d374ec9446ce24b7db33b66bee4ef38180d1abcd666d2aea468e7e452aa1e1565eedfefed582bf1c2fe477a4171d99d48772a