Analysis
-
max time kernel
13s -
max time network
14s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 12:45
Static task
static1
Behavioral task
behavioral1
Sample
Luxury+Shield+Cracked+By+@Vidhayakji786.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Luxury+Shield+Cracked+By+@Vidhayakji786.exe
Resource
win10v2004-20240802-en
General
-
Target
Luxury+Shield+Cracked+By+@Vidhayakji786.exe
-
Size
7.6MB
-
MD5
1117ddb074d8f71058637a7dd16fa36e
-
SHA1
ecb5fd94837008ed88d3f911e952b5ad3b7022b3
-
SHA256
7d52402f16b59ecba6ddb533b5b023730f5bf2a06b307dffab8645344085e22b
-
SHA512
12f1993b1470c2d6a3830a467f679e97479fe384a2c8bc540f6aa99c262276c7616b44a8cb60f4ac1330a3f6e3a6073e696a72a4b4a1ade17862db02d0bf0125
-
SSDEEP
196608:baFVnyDTbyYIbX5YGVCurV7hPNCgCe+aE:uFByzwiRQCw+9
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 5016 Luxury+Shield+Cracked+By+@Vidhayakji786.exe 5016 Luxury+Shield+Cracked+By+@Vidhayakji786.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4032 5016 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Luxury+Shield+Cracked+By+@Vidhayakji786.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 5016 Luxury+Shield+Cracked+By+@Vidhayakji786.exe Token: SeDebugPrivilege 1844 taskmgr.exe Token: SeSystemProfilePrivilege 1844 taskmgr.exe Token: SeCreateGlobalPrivilege 1844 taskmgr.exe Token: 33 1844 taskmgr.exe Token: SeIncBasePriorityPrivilege 1844 taskmgr.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe -
Suspicious use of SendNotifyMessage 34 IoCs
pid Process 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe 1844 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5016 Luxury+Shield+Cracked+By+@Vidhayakji786.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Luxury+Shield+Cracked+By+@Vidhayakji786.exe"C:\Users\Admin\AppData\Local\Temp\Luxury+Shield+Cracked+By+@Vidhayakji786.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:5016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 10322⤵
- Program crash
PID:4032
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 5016 -ip 50161⤵PID:4448
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1844