Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2023 05:52
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
lz.exe
Resource
win7-20230831-en
windows7-x64
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
lz.exe
Resource
win10v2004-20230831-en
windows10-2004-x64
7 signatures
150 seconds
General
-
Target
lz.exe
-
Size
388KB
-
MD5
4ff84ca1c02088f313c97694244cb2a4
-
SHA1
d2ffff7d201ac6236d3d091047f498c11bae00d6
-
SHA256
f3126ddd86d1e048db68f22cb1de5de871282bbd5764c4c77867042c8f1aab93
-
SHA512
0ab79b098be51c4035871e1b85bb815954a0c936fb9bc5bc598ac824e1c4e45d5f6b56f4f3e4a063c82a91ab30cb953018abc9161e3b2cfdf785d97d6a09d00b
-
SSDEEP
12288:tCspLdeVEn/oEehNiNsF9hS2Oga+nqgU+1kkqabCtXSXNcqye9cBz:tCULoVEn/oEsA/2OgVqgU+1kkqabCtXB
Score
10/10
Malware Config
Extracted
Family
bitrat
Version
1.38
C2
rornfl12.duckdns.org:3072
Attributes
-
communication_password
81dc9bdb52d04dc20036dbd8313ed055
-
install_dir
chrome
-
install_file
updater
-
tor_process
tor
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
MSBuild.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1859779917-101786662-3680946609-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\updater = "C:\\Users\\Admin\\AppData\\Local\\chrome\\updater" MSBuild.exe Set value (str) \REGISTRY\USER\S-1-5-21-1859779917-101786662-3680946609-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\updater = "C:\\Users\\Admin\\AppData\\Local\\chrome\\updaterЀ" MSBuild.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
MSBuild.exepid process 1124 MSBuild.exe 1124 MSBuild.exe 1124 MSBuild.exe 1124 MSBuild.exe 1124 MSBuild.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
lz.exedescription pid process target process PID 2188 set thread context of 1124 2188 lz.exe MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
lz.exeMSBuild.exedescription pid process Token: SeDebugPrivilege 2188 lz.exe Token: SeShutdownPrivilege 1124 MSBuild.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
MSBuild.exepid process 1124 MSBuild.exe 1124 MSBuild.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
lz.exedescription pid process target process PID 2188 wrote to memory of 1124 2188 lz.exe MSBuild.exe PID 2188 wrote to memory of 1124 2188 lz.exe MSBuild.exe PID 2188 wrote to memory of 1124 2188 lz.exe MSBuild.exe PID 2188 wrote to memory of 1124 2188 lz.exe MSBuild.exe PID 2188 wrote to memory of 1124 2188 lz.exe MSBuild.exe PID 2188 wrote to memory of 1124 2188 lz.exe MSBuild.exe PID 2188 wrote to memory of 1124 2188 lz.exe MSBuild.exe PID 2188 wrote to memory of 1124 2188 lz.exe MSBuild.exe PID 2188 wrote to memory of 1124 2188 lz.exe MSBuild.exe PID 2188 wrote to memory of 1124 2188 lz.exe MSBuild.exe PID 2188 wrote to memory of 1124 2188 lz.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\lz.exe"C:\Users\Admin\AppData\Local\Temp\lz.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe2⤵
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1124