Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10-09-2024 18:51

General

  • Target

    Luxury Crypter_18.8.1.1_Cracked.exe

  • Size

    8.4MB

  • MD5

    07edd8c858453717b12394320db59f01

  • SHA1

    4270f53f550adc6d2e6faa3e7a8a43bcce5aacb6

  • SHA256

    74d59d15069a4a1e6f0c349651873f0b88dd303b8a60c7c86af3c3a8df02ec23

  • SHA512

    2a91abd03d84cca78c8b2c79c207f59d59f7ff42a3ebc7617f0053eb4e4cd20674e5233b189f753a70c74e4a1628c5a5f32d6ce0a15ed1625c57f07a0cb60574

  • SSDEEP

    196608:Lcw//95tuLGbGAOeqpowuu3+ukbeQn4vAWQHOL:Aw//FuL09OenO7kbebAr

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla payload 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Luxury Crypter_18.8.1.1_Cracked.exe
    "C:\Users\Admin\AppData\Local\Temp\Luxury Crypter_18.8.1.1_Cracked.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2300
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\c1m32qwa\c1m32qwa.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2596
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCBE7.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC1F146D5734894F7EAFC5E4FED965024.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2484
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c ILMerge /target:winexe /out:C:\Users\Admin\AppData\Local\Temp\yZSM.exe C:\Users\Admin\AppData\Local\Temp\JmNeK C:\Users\Admin\AppData\Local\Temp\Luxury.dll /targetplatform:v4,C:\Windows\Microsoft.NET\Framework\v4.0.30319
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1264
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1084
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\JmNeK

    Filesize

    1.3MB

    MD5

    bea699f05f2015457e725ccd4f71af37

    SHA1

    647665acc1dbbd7271cf4555c64386b49b73cf66

    SHA256

    a15594c21272046a92ce0425f1dae1813896b3d0e7c768d4945f0e0e4b9083e1

    SHA512

    9eb9eed6a6404a665061c01fecd5aed33526f58d72c6138a970eafe96675cf0a779bbbba68a2e992c85980c2e7dc7c95365f2e6383d0813aa4eaa3ef5dc39368

  • C:\Users\Admin\AppData\Local\Temp\RESCBE7.tmp

    Filesize

    2KB

    MD5

    a1f49bae9a44d07203abc7fb86ca8b63

    SHA1

    47e358ece29720cba12b72dc679e41c9f61c99f6

    SHA256

    7233d998281af15c20cde7c3598290ff9cc33d3520260910723515f19832f3b7

    SHA512

    ae4206cc8d09af805ab50eda48eaf447a27f00ff549a8a92a35aee2151461df23d30bb57c0b69b9d326755b59ed7a9ea30b49a944bab90cc5f7a202096cb8709

  • \??\c:\Users\Admin\AppData\Local\Temp\CSC1F146D5734894F7EAFC5E4FED965024.TMP

    Filesize

    1KB

    MD5

    a77630e81777df615665f38201e6ba91

    SHA1

    55c7643a826301d662240c6a5047cf6249ce1d30

    SHA256

    84038274e443a29877dcd517a9978edf8089355ff63403d776471e342f841cc4

    SHA512

    7f57b0e96a1294a9b50a9b68c73524e961678973dcdf2e53ea99487c3e48328dfc490a03cff96c3277f5cd239eca6e7232a9d6b15d7091f9f212b2221b2558f6

  • \??\c:\Users\Admin\AppData\Local\Temp\Luxury.dll

    Filesize

    177KB

    MD5

    d1bc71bce98aa4f7dcf4c59eae2b3307

    SHA1

    865723f5a2cbd475618cc0674d281c806f8eb9d4

    SHA256

    7bc49e595e3d5611c62a040fc6be5129c78e8db02a79e30a0261883d2c3c06a3

    SHA512

    6a48a2874db8ec0cd492fd59fa834a3456146cf08fb497ea2de8678467c07a110d45f8a8d469e568f1278e6280d310acbe75a339c2b5162b8a9d2618118414cf

  • \??\c:\Users\Admin\AppData\Local\Temp\c1m32qwa\c1m32qwa.0.cs

    Filesize

    656KB

    MD5

    40b4c37898ab1e44ff7cae705308f164

    SHA1

    14807527712d0709d2c92e9efb168ab83a6d63e9

    SHA256

    ced8dea335faa8a156aecb0bae1c197890333e832c86b469541cd5f20011f03c

    SHA512

    3bc0eaa15dd7178777b42ecc01cebf747ba0e012221c5f68085a560edad5c10398dae09211a4af34728131a859dc3294e55e9b94259bd37dbb04774203301f33

  • \??\c:\Users\Admin\AppData\Local\Temp\c1m32qwa\c1m32qwa.cmdline

    Filesize

    474B

    MD5

    bdb6742f335da40721fd3a6eb5aa8024

    SHA1

    2a796b9e7cda8b80dd49346ab49c3518d345923c

    SHA256

    a42806f907f5227017d44869321ace7e58af4a98a10feebbac97b613e71506fc

    SHA512

    84340736d5803780dad13f1575b208aaf73f22545d2d5df7eeeed9998db78168b6ce1d359fe2d12a0d91c8cd5b08f79a1a990df6a2e772a61a3a2006a94286f9

  • memory/2300-11-0x00000000740CE000-0x00000000740CF000-memory.dmp

    Filesize

    4KB

  • memory/2300-14-0x00000000740C0000-0x00000000747AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2300-8-0x00000000740C0000-0x00000000747AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2300-9-0x00000000740C0000-0x00000000747AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2300-0-0x00000000740CE000-0x00000000740CF000-memory.dmp

    Filesize

    4KB

  • memory/2300-12-0x00000000740C0000-0x00000000747AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2300-13-0x00000000740C0000-0x00000000747AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2300-7-0x00000000075B0000-0x00000000075D6000-memory.dmp

    Filesize

    152KB

  • memory/2300-15-0x000000000A640000-0x000000000A642000-memory.dmp

    Filesize

    8KB

  • memory/2300-16-0x00000000080B0000-0x0000000008104000-memory.dmp

    Filesize

    336KB

  • memory/2300-6-0x00000000011D0000-0x00000000011DA000-memory.dmp

    Filesize

    40KB

  • memory/2300-5-0x0000000005460000-0x00000000054C2000-memory.dmp

    Filesize

    392KB

  • memory/2300-4-0x0000000006D70000-0x0000000006F82000-memory.dmp

    Filesize

    2.1MB

  • memory/2300-3-0x0000000006750000-0x0000000006D74000-memory.dmp

    Filesize

    6.1MB

  • memory/2300-2-0x00000000740C0000-0x00000000747AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2300-1-0x00000000002D0000-0x0000000000B40000-memory.dmp

    Filesize

    8.4MB