Overview
overview
10Static
static
33d2c39385f...87.exe
windows7-x64
103d2c39385f...87.exe
windows10-2004-x64
10$PLUGINSDIR/INetC.dll
windows7-x64
3$PLUGINSDIR/INetC.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...ll.dll
windows7-x64
3$PLUGINSDI...ll.dll
windows10-2004-x64
3$PLUGINSDI...ry.dll
windows7-x64
3$PLUGINSDI...ry.dll
windows10-2004-x64
3Lucasrt.exe
windows7-x64
10Lucasrt.exe
windows10-2004-x64
10libeay32.dll
windows7-x64
1libeay32.dll
windows10-2004-x64
1ssleay32.dll
windows7-x64
1ssleay32.dll
windows10-2004-x64
1Analysis
-
max time kernel
133s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2024 08:36
Static task
static1
Behavioral task
behavioral1
Sample
3d2c39385f1d4b1ab690c524091644f344dac8abc8249af9c8ac54d0b2d51b87.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
3d2c39385f1d4b1ab690c524091644f344dac8abc8249af9c8ac54d0b2d51b87.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/INetC.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/INetC.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsisFirewall.dll
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsisFirewall.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/registry.dll
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/registry.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral13
Sample
Lucasrt.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
Lucasrt.exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral15
Sample
libeay32.dll
Resource
win7-20240419-en
Behavioral task
behavioral16
Sample
libeay32.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral17
Sample
ssleay32.dll
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
ssleay32.dll
Resource
win10v2004-20240419-en
General
-
Target
Lucasrt.exe
-
Size
11.2MB
-
MD5
51ffec7d16d89f59784e7cfad795df3c
-
SHA1
1c0a5ad4fd9c74f829b63e7b8bfe897120d24f00
-
SHA256
dae52d89f6b61329c806fd90b0e13fc3c3cf2cb5761b50321039b838ac0bc343
-
SHA512
5936e9d854c070e5d3ff8b31937729574a3d6cf69967558d8e6dc0096c720e44df0d59bf5ab419b73c44909d3e04f9b8da47f64c960ac338ff5e73f8749bba5d
-
SSDEEP
98304:G6OwlI2RKvm132+y6gu70DNGyTuM+62wkYePy45CZGXPI+3ZYOx5+to:66fRKvm13Tyw0DNw7CZGg+Jvx5Wo
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Lucasrt.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2860750803-256193626-1801997576-1000\Control Panel\International\Geo\Nation Lucasrt.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
Lucasrt.exeLucasrt.exepid Process 1788 Lucasrt.exe 1788 Lucasrt.exe 1788 Lucasrt.exe 1788 Lucasrt.exe 1788 Lucasrt.exe 1788 Lucasrt.exe 1788 Lucasrt.exe 1788 Lucasrt.exe 4772 Lucasrt.exe 4772 Lucasrt.exe 4772 Lucasrt.exe 4772 Lucasrt.exe 4772 Lucasrt.exe 4772 Lucasrt.exe 4772 Lucasrt.exe 4772 Lucasrt.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
Lucasrt.exeLucasrt.exedescription pid Process Token: SeDebugPrivilege 1788 Lucasrt.exe Token: SeTakeOwnershipPrivilege 4772 Lucasrt.exe Token: SeTcbPrivilege 4772 Lucasrt.exe Token: SeTcbPrivilege 4772 Lucasrt.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
Lucasrt.exeLucasrt.exepid Process 1788 Lucasrt.exe 1788 Lucasrt.exe 1788 Lucasrt.exe 1788 Lucasrt.exe 4772 Lucasrt.exe 4772 Lucasrt.exe 4772 Lucasrt.exe 4772 Lucasrt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Lucasrt.exe"C:\Users\Admin\AppData\Local\Temp\Lucasrt.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\Lucasrt.exeC:\Users\Admin\AppData\Local\Temp\Lucasrt.exe -second2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4772
-