Overview
overview
10Static
static
33d2c39385f...87.exe
windows7-x64
103d2c39385f...87.exe
windows10-2004-x64
10$PLUGINSDIR/INetC.dll
windows7-x64
3$PLUGINSDIR/INetC.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDI...ry.dll
windows7-x64
3$PLUGINSDI...ry.dll
windows10-2004-x64
3Lucasrt.exe
windows7-x64
10Lucasrt.exe
windows10-2004-x64
10libeay32.dll
windows7-x64
1libeay32.dll
windows10-2004-x64
1ssleay32.dll
windows7-x64
1ssleay32.dll
windows10-2004-x64
1Analysis
-
max time kernel
131s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
06-05-2024 08:36
Static task
static1
Behavioral task
behavioral1
Sample
3d2c39385f1d4b1ab690c524091644f344dac8abc8249af9c8ac54d0b2d51b87.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
3d2c39385f1d4b1ab690c524091644f344dac8abc8249af9c8ac54d0b2d51b87.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/INetC.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/INetC.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsisFirewall.dll
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsisFirewall.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/registry.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/registry.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral13
Sample
Lucasrt.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
Lucasrt.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral15
Sample
libeay32.dll
Resource
win7-20240419-en
Behavioral task
behavioral16
Sample
libeay32.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral17
Sample
ssleay32.dll
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
ssleay32.dll
Resource
win10v2004-20240419-en
General
-
Target
Lucasrt.exe
-
Size
11.2MB
-
MD5
51ffec7d16d89f59784e7cfad795df3c
-
SHA1
1c0a5ad4fd9c74f829b63e7b8bfe897120d24f00
-
SHA256
dae52d89f6b61329c806fd90b0e13fc3c3cf2cb5761b50321039b838ac0bc343
-
SHA512
5936e9d854c070e5d3ff8b31937729574a3d6cf69967558d8e6dc0096c720e44df0d59bf5ab419b73c44909d3e04f9b8da47f64c960ac338ff5e73f8749bba5d
-
SSDEEP
98304:G6OwlI2RKvm132+y6gu70DNGyTuM+62wkYePy45CZGXPI+3ZYOx5+to:66fRKvm13Tyw0DNw7CZGg+Jvx5Wo
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Lucasrt.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Control Panel\International\Geo\Nation Lucasrt.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
Lucasrt.exeLucasrt.exepid process 2084 Lucasrt.exe 2084 Lucasrt.exe 2084 Lucasrt.exe 2084 Lucasrt.exe 2084 Lucasrt.exe 2084 Lucasrt.exe 2604 Lucasrt.exe 2604 Lucasrt.exe 2604 Lucasrt.exe 2604 Lucasrt.exe 2604 Lucasrt.exe 2604 Lucasrt.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
Lucasrt.exeLucasrt.exedescription pid process Token: SeDebugPrivilege 2084 Lucasrt.exe Token: SeTakeOwnershipPrivilege 2604 Lucasrt.exe Token: SeTcbPrivilege 2604 Lucasrt.exe Token: SeTcbPrivilege 2604 Lucasrt.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
Lucasrt.exeLucasrt.exepid process 2084 Lucasrt.exe 2084 Lucasrt.exe 2084 Lucasrt.exe 2084 Lucasrt.exe 2604 Lucasrt.exe 2604 Lucasrt.exe 2604 Lucasrt.exe 2604 Lucasrt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Lucasrt.exe"C:\Users\Admin\AppData\Local\Temp\Lucasrt.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\Lucasrt.exeC:\Users\Admin\AppData\Local\Temp\Lucasrt.exe -second2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2604
-