Overview
overview
7Static
static
3Lethal company.zip
windows7-x64
1Lethal company.zip
windows10-2004-x64
1Lethal Com...ic.rar
windows7-x64
3Lethal Com...ic.rar
windows10-2004-x64
7Lethal Com...Ex.zip
windows7-x64
1Lethal Com...Ex.zip
windows10-2004-x64
1Lethal Com...er.dat
windows7-x64
3Lethal Com...er.dat
windows10-2004-x64
3Lethal Com...YT.cfg
windows7-x64
3Lethal Com...YT.cfg
windows10-2004-x64
3Lethal Com...ny.cfg
windows7-x64
3Lethal Com...ny.cfg
windows10-2004-x64
3Lethal Com...ot.cfg
windows7-x64
3Lethal Com...ot.cfg
windows10-2004-x64
3Lethal Com...ny.dll
windows7-x64
1Lethal Com...ny.dll
windows10-2004-x64
1Lethal Com...20.dll
windows7-x64
1Lethal Com...20.dll
windows10-2004-x64
1Lethal Com...op.dll
windows7-x64
1Lethal Com...op.dll
windows10-2004-x64
1Lethal Com...db.dll
windows7-x64
1Lethal Com...db.dll
windows10-2004-x64
1Lethal Com...db.dll
windows7-x64
1Lethal Com...db.dll
windows10-2004-x64
1Lethal Com...ls.dll
windows7-x64
1Lethal Com...ls.dll
windows10-2004-x64
1Lethal Com...en.exe
windows7-x64
1Lethal Com...en.exe
windows10-2004-x64
1Lethal Com...ie.dll
windows7-x64
1Lethal Com...ie.dll
windows10-2004-x64
1Lethal Com...assets
windows7-x64
1Lethal Com...assets
windows10-2004-x64
1Analysis
-
max time kernel
102s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
01-06-2024 14:19
Behavioral task
behavioral1
Sample
Lethal company.zip
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Lethal company.zip
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Lethal Company/Fix Repair/LethalCompany_Fix_Repair_Steam_Generic.rar
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
Lethal Company/Fix Repair/LethalCompany_Fix_Repair_Steam_Generic.rar
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
Lethal Company/Lethal Company/BepInEx.zip
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
Lethal Company/Lethal Company/BepInEx.zip
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
Lethal Company/Lethal Company/BepInEx/cache/chainloader_typeloader.dat
Resource
win7-20240215-en
Behavioral task
behavioral8
Sample
Lethal Company/Lethal Company/BepInEx/cache/chainloader_typeloader.dat
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
Lethal Company/Lethal Company/BepInEx/config/BoomboxYT.cfg
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Lethal Company/Lethal Company/BepInEx/config/BoomboxYT.cfg
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
Lethal Company/Lethal Company/BepInEx/config/ControlCompany.ControlCompany.cfg
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
Lethal Company/Lethal Company/BepInEx/config/ControlCompany.ControlCompany.cfg
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
Lethal Company/Lethal Company/BepInEx/config/FlipMods.ReservedFlashlightSlot.cfg
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
Lethal Company/Lethal Company/BepInEx/config/FlipMods.ReservedFlashlightSlot.cfg
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
Lethal Company/Lethal Company/BepInEx/core/0Harmony.dll
Resource
win7-20231129-en
Behavioral task
behavioral16
Sample
Lethal Company/Lethal Company/BepInEx/core/0Harmony.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
Lethal Company/Lethal Company/BepInEx/core/0Harmony20.dll
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
Lethal Company/Lethal Company/BepInEx/core/0Harmony20.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
Lethal Company/Lethal Company/BepInEx/core/HarmonyXInterop.dll
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
Lethal Company/Lethal Company/BepInEx/core/HarmonyXInterop.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
Lethal Company/Lethal Company/BepInEx/core/Mono.Cecil.Mdb.dll
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
Lethal Company/Lethal Company/BepInEx/core/Mono.Cecil.Mdb.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral23
Sample
Lethal Company/Lethal Company/BepInEx/core/Mono.Cecil.Pdb.dll
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
Lethal Company/Lethal Company/BepInEx/core/Mono.Cecil.Pdb.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
Lethal Company/Lethal Company/BepInEx/core/MonoMod.Utils.dll
Resource
win7-20240419-en
Behavioral task
behavioral26
Sample
Lethal Company/Lethal Company/BepInEx/core/MonoMod.Utils.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral27
Sample
Lethal Company/Lethal Company/BepInEx/patchers/BepInEx.MonoMod.HookGenPatcher/MonoMod.RuntimeDetour.HookGen.exe
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
Lethal Company/Lethal Company/BepInEx/patchers/BepInEx.MonoMod.HookGenPatcher/MonoMod.RuntimeDetour.HookGen.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
Lethal Company/Lethal Company/BepInEx/plugins/AlwaysHearWalkie.dll
Resource
win7-20240215-en
Behavioral task
behavioral30
Sample
Lethal Company/Lethal Company/BepInEx/plugins/AlwaysHearWalkie.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
Lethal Company/Lethal Company/BepInEx/plugins/AssetBundles/ui-assets
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
Lethal Company/Lethal Company/BepInEx/plugins/AssetBundles/ui-assets
Resource
win10v2004-20240508-en
General
-
Target
Lethal Company/Lethal Company/BepInEx/config/BoomboxYT.cfg
-
Size
235B
-
MD5
f6492d91f87445fcf2cf68b2434f285b
-
SHA1
b50530a39bc683c49da8a3e57fd45a7560f7aeaa
-
SHA256
c4fc850fdaf4d5122dcfcce2f03aeb0f8ad366b017ab20ceb6c71cbb2f957478
-
SHA512
901a536bbf2eeebde6e41ec8b88725a272f85a0a148b82c4944952641925c0f1bf668ae499dfc4b2a303b98b4fd1841fa9ea7364bf72a4d6b1b0b4a45d94a88f
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\.cfg\ = "cfg_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\cfg_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\.cfg rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\cfg_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\cfg_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\cfg_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\cfg_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\cfg_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_Classes\Local Settings rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2604 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2604 AcroRd32.exe 2604 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2716 2376 cmd.exe 29 PID 2376 wrote to memory of 2716 2376 cmd.exe 29 PID 2376 wrote to memory of 2716 2376 cmd.exe 29 PID 2716 wrote to memory of 2604 2716 rundll32.exe 30 PID 2716 wrote to memory of 2604 2716 rundll32.exe 30 PID 2716 wrote to memory of 2604 2716 rundll32.exe 30 PID 2716 wrote to memory of 2604 2716 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Lethal Company\Lethal Company\BepInEx\config\BoomboxYT.cfg"1⤵
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Lethal Company\Lethal Company\BepInEx\config\BoomboxYT.cfg2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Lethal Company\Lethal Company\BepInEx\config\BoomboxYT.cfg"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2604
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5b46c18cec7de2ab118d23e760f4bff77
SHA1c4251b70d7bbd01d947a94729d22a98361987dc9
SHA256ddf89c1fbc93c209b78e6a4a829979370fd5ef23078decabce5c692f34e99b7e
SHA51286b4d60dde547dc25dc6d0560153fdbb0bbf8d4b3b47b4948326e9eef91d1024a29eb1d9e718a3c3390d78273b212f78e5d01c40970a36caa80917c3cc6430e5