Overview
overview
7Static
static
7Loveware-master.zip
windows7-x64
1Loveware-m...ort.md
windows7-x64
3Loveware-m...gs.yml
windows7-x64
3Loveware-m...UCT.md
windows7-x64
3Loveware-m...ING.md
windows7-x64
3Loveware-m...er.jpg
windows7-x64
3Loveware-m...er.exe
windows7-x64
7Loveware-m...4).exe
windows7-x64
7Loveware-m...gs.ini
windows7-x64
1Loveware-m...er.png
windows7-x64
3Loveware-m...re.ico
windows7-x64
3Loveware-m...re.png
windows7-x64
3Loveware-m...ki.png
windows7-x64
3Loveware-m...ar.png
windows7-x64
3Loveware-m...ICENSE
windows7-x64
1Loveware-m...ON.txt
windows7-x64
1Loveware-m...ad.exe
windows7-x64
6Loveware-m...ME.txt
windows7-x64
1Loveware-m...re.bat
windows7-x64
4Loveware-m...kspace
windows7-x64
3Loveware-m...re.ico
windows7-x64
3Loveware-m...DME.md
windows7-x64
3Loveware-m...ig.yml
windows7-x64
3Analysis
-
max time kernel
1559s -
max time network
1560s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
17-02-2024 15:07
Behavioral task
behavioral1
Sample
Loveware-master.zip
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Loveware-master/.github/ISSUE_TEMPLATE/bug_report.md
Resource
win7-20231215-en
Behavioral task
behavioral3
Sample
Loveware-master/.github/workflows/greetings.yml
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Loveware-master/CODE_OF_CONDUCT.md
Resource
win7-20231215-en
Behavioral task
behavioral5
Sample
Loveware-master/CONTRIBUTING.md
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
Loveware-master/Extras/Banner.jpg
Resource
win7-20231215-en
Behavioral task
behavioral7
Sample
Loveware-master/Extras/CONVERTER/Bat_To_Exe_Converter.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
Loveware-master/Extras/CONVERTER/Bat_To_Exe_Converter_(x64).exe
Resource
win7-20231129-en
Behavioral task
behavioral9
Sample
Loveware-master/Extras/CONVERTER/settings.ini
Resource
win7-20240215-en
Behavioral task
behavioral10
Sample
Loveware-master/Extras/Footer.png
Resource
win7-20231215-en
Behavioral task
behavioral11
Sample
Loveware-master/Extras/Loveware.ico
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
Loveware-master/Extras/Loveware.png
Resource
win7-20231215-en
Behavioral task
behavioral13
Sample
Loveware-master/Extras/PayloadsWiki.png
Resource
win7-20231215-en
Behavioral task
behavioral14
Sample
Loveware-master/Extras/SideBar.png
Resource
win7-20231215-en
Behavioral task
behavioral15
Sample
Loveware-master/LICENSE
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
Loveware-master/Loveware/DOCUMENTATION.txt
Resource
win7-20231215-en
Behavioral task
behavioral17
Sample
Loveware-master/Loveware/FinalPayload/FinalPayload.exe
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
Loveware-master/Loveware/FinalPayload/README.txt
Resource
win7-20231129-en
Behavioral task
behavioral19
Sample
Loveware-master/Loveware/Loveware.bat
Resource
win7-20240215-en
Behavioral task
behavioral20
Sample
Loveware-master/Loveware/Loveware.code-workspace
Resource
win7-20231215-en
Behavioral task
behavioral21
Sample
Loveware-master/Loveware/Loveware.ico
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
Loveware-master/README.md
Resource
win7-20231215-en
Behavioral task
behavioral23
Sample
Loveware-master/_config.yml
Resource
win7-20231129-en
General
-
Target
Loveware-master/Loveware/Loveware.bat
-
Size
27KB
-
MD5
499c5aa1b21e9029f76bc57de37907ad
-
SHA1
a2552f2bc1f7d10eb409e864d15065ff1cab94b9
-
SHA256
eacce5121ddb3922e6234a3210e9e291028d0520e1ceb7e325d3a093917eb228
-
SHA512
56e9bacfe08f6511ad54c4134f7a051b434e0e3db60a73eebd4d3f12dd29f9f95ed77e54765ec10f4b50894e2ba0ee0de66288c148f1feef9084f61baaa41a50
-
SSDEEP
384:0omL5IjEZiZryAOENuPuOJsYTQpLuLpDq7QYfLGMV+jasHHLgLxLJsYTgV+L0py/:0nmNu2OJsYTBJcJsYTtz9aF4GC
Malware Config
Signatures
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ifvm.vbs cmd.exe File opened for modification C:\Windows\ifvm.vbs cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1884 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1884 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1268 wrote to memory of 2860 1268 cmd.exe 29 PID 1268 wrote to memory of 2860 1268 cmd.exe 29 PID 1268 wrote to memory of 2860 1268 cmd.exe 29 PID 2860 wrote to memory of 1884 2860 cmd.exe 30 PID 2860 wrote to memory of 1884 2860 cmd.exe 30 PID 2860 wrote to memory of 1884 2860 cmd.exe 30 PID 1268 wrote to memory of 2580 1268 cmd.exe 32 PID 1268 wrote to memory of 2580 1268 cmd.exe 32 PID 1268 wrote to memory of 2580 1268 cmd.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Loveware-master\Loveware\Loveware.bat"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c PowerShell.exe -command " (gwmi Win32_BaseBoard).Manufacturer -eq 'Microsoft Corporation' "2⤵
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePowerShell.exe -command " (gwmi Win32_BaseBoard).Manufacturer -eq 'Microsoft Corporation' "3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1884
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\ifvm.vbs"2⤵PID:2580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
246B
MD56c1a5496a5e830f65bb650d7ecd95767
SHA12ec967c077c7551e62977119afde36a56def19af
SHA2564c1c3d1a518e0f63642d906ba0d97ed394b0bca2fc5a3437e7f30a3f479197d0
SHA512ba6f4f9804ca91abd7341b5bb009042990473ebbd0ca8cb8be54dff88ac47db4cb054f2b8a2630e0af2587ef94c9781f31a582fd252d47d97752e23eacfd820a