Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
04-06-2024 03:35
Behavioral task
behavioral1
Sample
Lowez External/Lowez External/1. Disable Defender Tool/dControl.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Lowez External/Lowez External/1. Disable Defender Tool/dControl.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Lowez External/Lowez External/2. Cheat/Lowez External.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
Lowez External/Lowez External/2. Cheat/Lowez External.exe
Resource
win10v2004-20240426-en
General
-
Target
Lowez External/Lowez External/2. Cheat/Lowez External.exe
-
Size
714KB
-
MD5
8fddd1e31a5d782f4ee47a6de32e69eb
-
SHA1
a961f0ff83d6b13ebfb82a103ff217f62bff9830
-
SHA256
1e060cd7e39930b5d872e4edb4854d4c29a72a6262da052014176abbb8a98deb
-
SHA512
575535bace7ef646405d55a08986a3e86bdb80e9cbb6235e0b5db12aa6dfc8a7f25f7625902ff4f35f0510bf86f9f9253456334311a8ae7c74bfc5a2742578a5
-
SSDEEP
6144:QV+n+Zr3hlHXOE9kskcEWFg69qnhpCIcp1H52FZi5kKWld3s9QGlO1ZDvdQlTzI3:Q6QHXwZWh9qnhpDc1X+Xr38k1ZDvgT1
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\GeqhFuccDXOGTmqxLlMAndqIUuh\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\GeqhFuccDXOGTmqxLlMAndqIUuh" kdmapper.exe -
Executes dropped EXE 1 IoCs
pid Process 2352 kdmapper.exe -
Loads dropped DLL 1 IoCs
pid Process 2716 cmd.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2352 kdmapper.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 2352 kdmapper.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2020 wrote to memory of 3068 2020 Lowez External.exe 29 PID 2020 wrote to memory of 3068 2020 Lowez External.exe 29 PID 2020 wrote to memory of 3068 2020 Lowez External.exe 29 PID 2020 wrote to memory of 2600 2020 Lowez External.exe 30 PID 2020 wrote to memory of 2600 2020 Lowez External.exe 30 PID 2020 wrote to memory of 2600 2020 Lowez External.exe 30 PID 2020 wrote to memory of 2884 2020 Lowez External.exe 31 PID 2020 wrote to memory of 2884 2020 Lowez External.exe 31 PID 2020 wrote to memory of 2884 2020 Lowez External.exe 31 PID 2020 wrote to memory of 2716 2020 Lowez External.exe 32 PID 2020 wrote to memory of 2716 2020 Lowez External.exe 32 PID 2020 wrote to memory of 2716 2020 Lowez External.exe 32 PID 2716 wrote to memory of 2352 2716 cmd.exe 33 PID 2716 wrote to memory of 2352 2716 cmd.exe 33 PID 2716 wrote to memory of 2352 2716 cmd.exe 33 PID 2020 wrote to memory of 2624 2020 Lowez External.exe 34 PID 2020 wrote to memory of 2624 2020 Lowez External.exe 34 PID 2020 wrote to memory of 2624 2020 Lowez External.exe 34 PID 2020 wrote to memory of 2664 2020 Lowez External.exe 35 PID 2020 wrote to memory of 2664 2020 Lowez External.exe 35 PID 2020 wrote to memory of 2664 2020 Lowez External.exe 35 PID 2020 wrote to memory of 2808 2020 Lowez External.exe 36 PID 2020 wrote to memory of 2808 2020 Lowez External.exe 36 PID 2020 wrote to memory of 2808 2020 Lowez External.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\Lowez External\Lowez External\2. Cheat\Lowez External.exe"C:\Users\Admin\AppData\Local\Temp\Lowez External\Lowez External\2. Cheat\Lowez External.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3068
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2600
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2884
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\kdmapper.exe C:\Users\driver.sys2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\kdmapper.exeC:\Users\kdmapper.exe C:\Users\driver.sys3⤵
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2352
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2624
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2664
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2808
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD5ac15ff5be766b5819ea274d0eb6a37f4
SHA17de774980c521edc03d701a9090dc033393ef479
SHA25698d3fd9e34b866769899f0d419e9480c792315d0dfc8e5c429655f085a529e97
SHA51231506c1fb56f5e5f0dbae72d5d86443628b0f2a46d93edd955ff0f634759d0e828b6ac149e71078f4cf304ac9f7af11609406bebea6625796f3127b69fbfceee