Analysis
-
max time kernel
100s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 00:49
Static task
static1
Behavioral task
behavioral1
Sample
75acde9221d6b38c8a2547d8bf9202f0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
75acde9221d6b38c8a2547d8bf9202f0N.exe
Resource
win10v2004-20240709-en
General
-
Target
75acde9221d6b38c8a2547d8bf9202f0N.exe
-
Size
15KB
-
MD5
75acde9221d6b38c8a2547d8bf9202f0
-
SHA1
3f966428543cc1bcb187a8cafc516322c97fc202
-
SHA256
ec8d9ef8d99f6ec9a664dfbcfd924815c7e383a1dad88c4797f8baa00ca3a34b
-
SHA512
cecaf96763370d38fb6d67acf2907c8bdf01e5cc68435e6dc5754996ff6ddcf6d657d6e5203b63152e756a85fc0772b3eb9d64437a046375795db43d8bcf4531
-
SSDEEP
384:kYho7iQAtR/zv87udVieokSSrOtEaq+hciduuLT+tkUGEg:uATTAud/atJTLLKSUGEg
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run LYLOADER.EXE -
Deletes itself 1 IoCs
pid Process 4528 LYLOADER.EXE -
Executes dropped EXE 1 IoCs
pid Process 4528 LYLOADER.EXE -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\MSDEG32.DLL LYLOADER.EXE File created C:\Windows\SysWOW64\REGKEY.hiv LYLOADER.EXE File created C:\Windows\SysWOW64\LYMANGR.DLL LYLOADER.EXE -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 75acde9221d6b38c8a2547d8bf9202f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LYLOADER.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4528 LYLOADER.EXE 4528 LYLOADER.EXE 4528 LYLOADER.EXE 4528 LYLOADER.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 4528 LYLOADER.EXE Token: SeDebugPrivilege 4528 LYLOADER.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 744 wrote to memory of 4528 744 75acde9221d6b38c8a2547d8bf9202f0N.exe 86 PID 744 wrote to memory of 4528 744 75acde9221d6b38c8a2547d8bf9202f0N.exe 86 PID 744 wrote to memory of 4528 744 75acde9221d6b38c8a2547d8bf9202f0N.exe 86 PID 4528 wrote to memory of 3532 4528 LYLOADER.EXE 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\75acde9221d6b38c8a2547d8bf9202f0N.exe"C:\Users\Admin\AppData\Local\Temp\75acde9221d6b38c8a2547d8bf9202f0N.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Users\Admin\AppData\Local\Temp\LYLOADER.EXEC:\Users\Admin\AppData\Local\Temp\LYLOADER.EXE "C:\Users\Admin\AppData\Local\Temp\75acde9221d6b38c8a2547d8bf9202f0N.exe"3⤵
- Adds policy Run key to start application
- Deletes itself
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4528
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5e5a44f73aca316bb65072d6f8fc76e1c
SHA1dd0cca6f2279ff07b35c2e8631b030169e699abe
SHA256646c9ebf22bd8f944628cc33ad45700b87fd3fbc0fe6304dbfcff5c3045b56f8
SHA512235cefd8cd1f3ea8081f52f0a9aa076c73b47e0026bcac7045f091e2e8c91f3a2eae70c2391ad3cf974f84da48801587c7b0a242d96677297e8dc5d245d25332