Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04-06-2024 03:35
Behavioral task
behavioral1
Sample
Lowez External/Lowez External/1. Disable Defender Tool/dControl.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Lowez External/Lowez External/1. Disable Defender Tool/dControl.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Lowez External/Lowez External/2. Cheat/Lowez External.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
Lowez External/Lowez External/2. Cheat/Lowez External.exe
Resource
win10v2004-20240426-en
General
-
Target
Lowez External/Lowez External/2. Cheat/Lowez External.exe
-
Size
714KB
-
MD5
8fddd1e31a5d782f4ee47a6de32e69eb
-
SHA1
a961f0ff83d6b13ebfb82a103ff217f62bff9830
-
SHA256
1e060cd7e39930b5d872e4edb4854d4c29a72a6262da052014176abbb8a98deb
-
SHA512
575535bace7ef646405d55a08986a3e86bdb80e9cbb6235e0b5db12aa6dfc8a7f25f7625902ff4f35f0510bf86f9f9253456334311a8ae7c74bfc5a2742578a5
-
SSDEEP
6144:QV+n+Zr3hlHXOE9kskcEWFg69qnhpCIcp1H52FZi5kKWld3s9QGlO1ZDvdQlTzI3:Q6QHXwZWh9qnhpDc1X+Xr38k1ZDvgT1
Malware Config
Signatures
-
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\IrzgXkInmgRAxTZzHvddQxPjaSXJo\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\IrzgXkInmgRAxTZzHvddQxPjaSXJo" kdmapper.exe -
Executes dropped EXE 1 IoCs
pid Process 2336 kdmapper.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 2336 kdmapper.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 2336 kdmapper.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4184 wrote to memory of 2488 4184 Lowez External.exe 90 PID 4184 wrote to memory of 2488 4184 Lowez External.exe 90 PID 4184 wrote to memory of 1244 4184 Lowez External.exe 92 PID 4184 wrote to memory of 1244 4184 Lowez External.exe 92 PID 4184 wrote to memory of 2404 4184 Lowez External.exe 95 PID 4184 wrote to memory of 2404 4184 Lowez External.exe 95 PID 4184 wrote to memory of 4352 4184 Lowez External.exe 96 PID 4184 wrote to memory of 4352 4184 Lowez External.exe 96 PID 4352 wrote to memory of 2336 4352 cmd.exe 97 PID 4352 wrote to memory of 2336 4352 cmd.exe 97 PID 4184 wrote to memory of 3652 4184 Lowez External.exe 98 PID 4184 wrote to memory of 3652 4184 Lowez External.exe 98 PID 4184 wrote to memory of 5012 4184 Lowez External.exe 99 PID 4184 wrote to memory of 5012 4184 Lowez External.exe 99 PID 4184 wrote to memory of 4692 4184 Lowez External.exe 100 PID 4184 wrote to memory of 4692 4184 Lowez External.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\Lowez External\Lowez External\2. Cheat\Lowez External.exe"C:\Users\Admin\AppData\Local\Temp\Lowez External\Lowez External\2. Cheat\Lowez External.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2488
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:1244
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:2404
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\kdmapper.exe C:\Users\driver.sys2⤵
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\kdmapper.exeC:\Users\kdmapper.exe C:\Users\driver.sys3⤵
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:2336
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:3652
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:5012
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:4692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD5ac15ff5be766b5819ea274d0eb6a37f4
SHA17de774980c521edc03d701a9090dc033393ef479
SHA25698d3fd9e34b866769899f0d419e9480c792315d0dfc8e5c429655f085a529e97
SHA51231506c1fb56f5e5f0dbae72d5d86443628b0f2a46d93edd955ff0f634759d0e828b6ac149e71078f4cf304ac9f7af11609406bebea6625796f3127b69fbfceee