Analysis

  • max time kernel
    117s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    20/02/2024, 18:41

General

  • Target

    LilAssLoverV5.exe

  • Size

    2.2MB

  • MD5

    aa33d8fe785944982e5e4088e677badc

  • SHA1

    1e9d33f299caa29278140ae74a5ede78b4e70afa

  • SHA256

    a12d9d7fdc9ac3c493be01ed0ba2fd01a771e6da25078e4dacc21b31439ab35f

  • SHA512

    1092fdd04dec246ce4dae70e6f5df5f62e636af5be454666cd504b7c14faf8de9f23ab7685043a6fdc2fddd395e71cc6522fa0694a1c5251a1e5973545b01810

  • SSDEEP

    49152:lwNamLR621kLQteGDzExSJwppcU8aW6Bb2xqOB4WOc4aaN:lwcmV62y0teiExS+98GSqOBnOwU

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs 1 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\LilAssLoverV5.exe
    "C:\Users\Admin\AppData\Local\Temp\LilAssLoverV5.exe"
    1⤵
    • Sets service image path in registry
    • Suspicious behavior: LoadsDriver
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c pause
      2⤵
        PID:2192

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2220-0-0x000000013F880000-0x000000013FFC4000-memory.dmp

      Filesize

      7.3MB

    • memory/2220-2-0x000000013F880000-0x000000013FFC4000-memory.dmp

      Filesize

      7.3MB