Analysis
-
max time kernel
117s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
20/02/2024, 18:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
LilAssLoverV5.exe
Resource
win7-20231129-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
LilAssLoverV5.exe
Resource
win10v2004-20240220-en
10 signatures
150 seconds
General
-
Target
LilAssLoverV5.exe
-
Size
2.2MB
-
MD5
aa33d8fe785944982e5e4088e677badc
-
SHA1
1e9d33f299caa29278140ae74a5ede78b4e70afa
-
SHA256
a12d9d7fdc9ac3c493be01ed0ba2fd01a771e6da25078e4dacc21b31439ab35f
-
SHA512
1092fdd04dec246ce4dae70e6f5df5f62e636af5be454666cd504b7c14faf8de9f23ab7685043a6fdc2fddd395e71cc6522fa0694a1c5251a1e5973545b01810
-
SSDEEP
49152:lwNamLR621kLQteGDzExSJwppcU8aW6Bb2xqOB4WOc4aaN:lwcmV62y0teiExS+98GSqOBnOwU
Score
8/10
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\physmem64\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\physmem64" LilAssLoverV5.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2220 LilAssLoverV5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 2220 LilAssLoverV5.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2192 2220 LilAssLoverV5.exe 29 PID 2220 wrote to memory of 2192 2220 LilAssLoverV5.exe 29 PID 2220 wrote to memory of 2192 2220 LilAssLoverV5.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\LilAssLoverV5.exe"C:\Users\Admin\AppData\Local\Temp\LilAssLoverV5.exe"1⤵
- Sets service image path in registry
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c pause2⤵PID:2192
-