Analysis

  • max time kernel
    149s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    24-04-2024 16:52

General

  • Target

    65857d9171c7271d98118cf8cc9383fe7f098c66935fe9b8a77128d5921c2015.exe

  • Size

    104KB

  • MD5

    04f11f645c82ce66ef89bbc8cd14dbd4

  • SHA1

    52cddf036fe902f7dc31ba9faf71f76de236dd04

  • SHA256

    65857d9171c7271d98118cf8cc9383fe7f098c66935fe9b8a77128d5921c2015

  • SHA512

    1c2c831bf645377f60160e85570d0ff448c70a26f43380a6778fc355dc68a4a3786288ccc5a164e0eb7620cfb565cf2737402a75cab50d3255e8bc6fa3837006

  • SSDEEP

    1536:PSSSOiNqnTeh6hC8bwT+lyHcw1vjzVj+xakAyBGIs7oJd:KlkTehGwT+lyHB5XN+x9s7

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\65857d9171c7271d98118cf8cc9383fe7f098c66935fe9b8a77128d5921c2015.exe
    "C:\Users\Admin\AppData\Local\Temp\65857d9171c7271d98118cf8cc9383fe7f098c66935fe9b8a77128d5921c2015.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2912
    • C:\Users\Admin\luokie.exe
      "C:\Users\Admin\luokie.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2956

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\luokie.exe

    Filesize

    104KB

    MD5

    34336d718de93c8210f01395876c2175

    SHA1

    ae9722d799fada43d5068aad44ae32c642cf962f

    SHA256

    5f19d75ecbb5239279d41f484b4a92c3f2cc29f8686cf686cd17d8131a4748d6

    SHA512

    7b4964fde0662f412b651e8673b414ee6e5cf6593ce6378d58e0e0597ae78e13986cf29738cbd0afafc2dd2c45e3069c38a31cbe52207198d8703fdbd7ba7fd2