Malware Analysis Report

2024-11-15 08:37

Sample ID 240902-vewpastgpp
Target luythen-0.5.4.exe
SHA256 4edad8582c9e616cfb6b6ef3b968d99dd5ae5f3c8d25eeafaa58e484c8c0956e
Tags
agilenet discovery
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

4edad8582c9e616cfb6b6ef3b968d99dd5ae5f3c8d25eeafaa58e484c8c0956e

Threat Level: Shows suspicious behavior

The file luythen-0.5.4.exe was found to be: Shows suspicious behavior.

Malicious Activity Summary

agilenet discovery

Obfuscated with Agile.Net obfuscator

Program crash

System Location Discovery: System Language Discovery

Unsigned PE

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-09-02 16:54

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-09-02 16:54

Reported

2024-09-02 16:55

Platform

win10v2004-20240802-en

Max time kernel

14s

Max time network

14s

Command Line

"C:\Users\Admin\AppData\Local\Temp\luythen-0.5.4.exe"

Signatures

Obfuscated with Agile.Net obfuscator

agilenet
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\luythen-0.5.4.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\luythen-0.5.4.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\luythen-0.5.4.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\luythen-0.5.4.exe

"C:\Users\Admin\AppData\Local\Temp\luythen-0.5.4.exe"

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3560 -ip 3560

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3560 -s 1476

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 3560 -ip 3560

C:\Windows\SysWOW64\WerFault.exe

C:\Windows\SysWOW64\WerFault.exe -u -p 3560 -s 1500

Network

Country Destination Domain Proto
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 133.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 81.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp

Files

memory/3560-0-0x00000000749BE000-0x00000000749BF000-memory.dmp

memory/3560-1-0x00000000005D0000-0x000000000084E000-memory.dmp

memory/3560-2-0x00000000749B0000-0x0000000075160000-memory.dmp

memory/3560-3-0x0000000005B20000-0x00000000060C4000-memory.dmp

memory/3560-4-0x0000000005610000-0x00000000056A2000-memory.dmp

memory/3560-5-0x0000000005230000-0x000000000523A000-memory.dmp

memory/3560-7-0x00000000056B0000-0x0000000005746000-memory.dmp

memory/3560-6-0x0000000005240000-0x000000000524A000-memory.dmp

memory/3560-8-0x0000000005880000-0x000000000588A000-memory.dmp

memory/3560-9-0x0000000005900000-0x0000000005986000-memory.dmp

memory/3560-10-0x0000000005990000-0x00000000059E4000-memory.dmp

memory/3560-11-0x0000000005A50000-0x0000000005AB6000-memory.dmp

memory/3560-12-0x00000000058C0000-0x00000000058D6000-memory.dmp

memory/3560-13-0x00000000749B0000-0x0000000075160000-memory.dmp

memory/3560-14-0x00000000091F0000-0x000000000947E000-memory.dmp

memory/3560-15-0x00000000749BE000-0x00000000749BF000-memory.dmp

memory/3560-16-0x00000000749B0000-0x0000000075160000-memory.dmp

memory/3560-17-0x00000000749B0000-0x0000000075160000-memory.dmp

memory/3560-19-0x00000000749B0000-0x0000000075160000-memory.dmp