Analysis
-
max time kernel
316s -
max time network
866s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
15-06-2024 19:21
General
-
Target
LatteLoader.proc.exe
-
Size
3.8MB
-
MD5
b7c8096e33fc32793029095fd12bbd7e
-
SHA1
4c99c9b6a3a13794e344be7d91f305777ffbbfdd
-
SHA256
83aebb7f08de8734ddfa49ae2f266737681bb8e28536933bd0612ff6dbbb4e1f
-
SHA512
231c1c40a106942bc3fb5b2c1094c91d23215cbaa0a5f84a981908d41af2c967d47d317213a1e5cc55369536977ad5ccee01b06b29a451c8b8e0cf1bf233dc88
-
SSDEEP
98304:0dnxNseX5BrRZMq57ofZgdNjwUCoz09QYFBVznmj8:0drscbt93dNfDzMBhmo
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
LatteLoader.proc.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ LatteLoader.proc.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
LatteLoader.proc.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion LatteLoader.proc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion LatteLoader.proc.exe -
Processes:
resource yara_rule behavioral1/memory/2056-0-0x0000000140000000-0x0000000140A39000-memory.dmp themida behavioral1/memory/2056-8-0x0000000140000000-0x0000000140A39000-memory.dmp themida behavioral1/memory/2056-9-0x0000000140000000-0x0000000140A39000-memory.dmp themida behavioral1/memory/2056-10-0x0000000140000000-0x0000000140A39000-memory.dmp themida behavioral1/memory/2056-12-0x0000000140000000-0x0000000140A39000-memory.dmp themida -
Processes:
LatteLoader.proc.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA LatteLoader.proc.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
LatteLoader.proc.exepid process 2056 LatteLoader.proc.exe 2056 LatteLoader.proc.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 2292 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
LatteLoader.proc.exepid process 2056 LatteLoader.proc.exe 2056 LatteLoader.proc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
LatteLoader.proc.execmd.execmd.exedescription pid process target process PID 2056 wrote to memory of 204 2056 LatteLoader.proc.exe cmd.exe PID 2056 wrote to memory of 204 2056 LatteLoader.proc.exe cmd.exe PID 204 wrote to memory of 4560 204 cmd.exe cmd.exe PID 204 wrote to memory of 4560 204 cmd.exe cmd.exe PID 4560 wrote to memory of 2292 4560 cmd.exe timeout.exe PID 4560 wrote to memory of 2292 4560 cmd.exe timeout.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\LatteLoader.proc.exe"C:\Users\Admin\AppData\Local\Temp\LatteLoader.proc.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start cmd /C "color b && title Error && echo You need to run the KeyAuthApp.init(); function before any other KeyAuth functions && timeout /t 5"2⤵
- Suspicious use of WriteProcessMemory
PID:204 -
C:\Windows\system32\cmd.execmd /C "color b && title Error && echo You need to run the KeyAuthApp.init(); function before any other KeyAuth functions && timeout /t 5"3⤵
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\system32\timeout.exetimeout /t 54⤵
- Delays execution with timeout.exe
PID:2292
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2056-0-0x0000000140000000-0x0000000140A39000-memory.dmpFilesize
10.2MB
-
memory/2056-7-0x00007FFD8B948000-0x00007FFD8B94A000-memory.dmpFilesize
8KB
-
memory/2056-8-0x0000000140000000-0x0000000140A39000-memory.dmpFilesize
10.2MB
-
memory/2056-9-0x0000000140000000-0x0000000140A39000-memory.dmpFilesize
10.2MB
-
memory/2056-10-0x0000000140000000-0x0000000140A39000-memory.dmpFilesize
10.2MB
-
memory/2056-12-0x0000000140000000-0x0000000140A39000-memory.dmpFilesize
10.2MB