Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 08:24
Static task
static1
1 signatures
General
-
Target
Lucifer.exe
-
Size
96KB
-
MD5
e3d41c385bb6d23a1f09257033ccfb33
-
SHA1
a2ede7bc41adb444e3e3b63e604190d5379d859d
-
SHA256
cb59ccab7312cee6a0b136bb2ccb847e2e5bf42910db9de1e9570c26e23bfecf
-
SHA512
5fdfdf13f894a87171a9d40876c9b39155e0ac744e5b375b21216b62a9e219138968804827022ed4a9dff33e6ab19142b74a878ed6e37255475ea7dceed0296c
-
SSDEEP
1536:j2iaAUlVQAIzhqdxAGgwywvNprF2zOnxDqjYar+8v9DJQlFFB8gRjo3qMyIE:jqli58fVgw9rFxEY7gQzBMqMyIE
Malware Config
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 2704 Lucifer.exe 2704 Lucifer.exe 2704 Lucifer.exe 2704 Lucifer.exe 2704 Lucifer.exe 2704 Lucifer.exe 2704 Lucifer.exe 2704 Lucifer.exe 2704 Lucifer.exe 2704 Lucifer.exe 2704 Lucifer.exe 2704 Lucifer.exe 2704 Lucifer.exe 2704 Lucifer.exe 2704 Lucifer.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2704 Lucifer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2704 Lucifer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Lucifer.exe"C:\Users\Admin\AppData\Local\Temp\Lucifer.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2704
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1428