Overview
overview
10Static
static
3LiteRes.dll
windows7-x64
1LiteRes.dll
windows10-2004-x64
1LiteRes.dll
windows11-21h2-x64
1LiteSkinUtils.dll
windows7-x64
1LiteSkinUtils.dll
windows10-2004-x64
1LiteSkinUtils.dll
windows11-21h2-x64
1setup.exe
windows7-x64
10setup.exe
windows10-2004-x64
10setup.exe
windows11-21h2-x64
10Analysis
-
max time kernel
301s -
max time network
315s -
platform
windows10-2004_x64 -
resource
win10v2004-20240319-en -
resource tags
arch:x64arch:x86image:win10v2004-20240319-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2024, 05:54
Static task
static1
Behavioral task
behavioral1
Sample
LiteRes.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
LiteRes.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
LiteRes.dll
Resource
win11-20240214-en
Behavioral task
behavioral4
Sample
LiteSkinUtils.dll
Resource
win7-20240215-en
Behavioral task
behavioral5
Sample
LiteSkinUtils.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral6
Sample
LiteSkinUtils.dll
Resource
win11-20240221-en
Behavioral task
behavioral7
Sample
setup.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
setup.exe
Resource
win10v2004-20240319-en
General
-
Target
setup.exe
-
Size
786.0MB
-
MD5
28f933002ae3e44bf6111c4664c2d7aa
-
SHA1
010cb6284142ecb7f1ad716d88f8da32d7222e0b
-
SHA256
39433b514b24eae9780018087ee461e411671d2945bc7c2f47a19209ee56046c
-
SHA512
ad23f3f6aa76e4d4506fc8f31d3c9108219d22f967e450abd35f08b03afd406eafbb05039acaa69dc7d03f1cc279753a9b8ef82b69ad0d7bd17df04502d1bb83
-
SSDEEP
98304:rDcRPtm36r1qcTNQzNrDluebmEE+ey++Z:5362tlDeuZ
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\FirewallRules\C:\ = "1" setup.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ setup.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion setup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion setup.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA setup.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 42 api.myip.com 43 api.myip.com 48 ipinfo.io 49 ipinfo.io -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\GroupPolicy setup.exe File opened for modification C:\Windows\System32\GroupPolicy\gpt.ini setup.exe File created C:\Windows\System32\GroupPolicy\Machine\Registry.pol setup.exe File opened for modification C:\Windows\System32\GroupPolicy\GPT.INI setup.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4044 setup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\setup.exe"C:\Users\Admin\AppData\Local\Temp\setup.exe"1⤵
- Modifies firewall policy service
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4044
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc1⤵PID:3752
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum1⤵PID:3456
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1940 --field-trial-handle=2260,i,4762972005863767630,9297428255150568035,262144 --variations-seed-version /prefetch:81⤵PID:2448