Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 05:44

General

  • Target

    Worm.Win32.Ludbaruma.exe

  • Size

    45KB

  • MD5

    db9033e7597d4b6374687f905b6c7a90

  • SHA1

    56f3230e7e082e18bcb6f029a095f3bab0a643f3

  • SHA256

    ca190b44f75e56c761bdac39808ba488b84d948ff761d21e7ebe66a430bc9727

  • SHA512

    92767b84372e6ebfb3190f868888a816f58a230fc5c6d180be37e316219591367fcc8b0061597fb25e0b3c5e2fe43305f3b7310f45bcd3f8e30ad7e4667f8eb7

  • SSDEEP

    768:/mFQj8rM9whcqet8Wfb4JzRJwEIHU5U3rf12WmULgJs7DFK+5nEOK:1AwEmBT4JzRJwEeUW7f12xULgJzOK

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Disables RegEdit via registry modification 2 IoCs
  • Disables use of System Restore points 1 TTPs
  • Executes dropped EXE 7 IoCs
  • Modifies system executable filetype association 2 TTPs 13 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Drops file in System32 directory 6 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Control Panel 4 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Worm.Win32.Ludbaruma.exe
    "C:\Users\Admin\AppData\Local\Temp\Worm.Win32.Ludbaruma.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies visibility of file extensions in Explorer
    • Modifies visiblity of hidden/system files in Explorer
    • Disables RegEdit via registry modification
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:4848
    • C:\Windows\xk.exe
      C:\Windows\xk.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2168
    • C:\Windows\SysWOW64\IExplorer.exe
      C:\Windows\system32\IExplorer.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:708
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2128
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3916
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2808
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:4412
    • C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE
      "C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2508

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\WINDOWS\CSRSS.EXE

    Filesize

    45KB

    MD5

    4ff9b32cbffae48f7a62a71aa6e45487

    SHA1

    6aedde19cc614464619d3964b0c84d49d94c5891

    SHA256

    33f2a1e3468f732666cc119699ae1380a6328f50f0c7676909ec71d130d8b8fd

    SHA512

    31726d288a942abf5caa5f75f8ba5c9698b1d08a5d3d9bcef0b7d21a21f3944c645098f049eb7ee3f7a289b394a29327bb307a0d4e6439c93303c8290d9baa94

  • C:\Users\Admin\AppData\Local\WINDOWS\LSASS.EXE

    Filesize

    45KB

    MD5

    18cebf2b1153f6aa3be013d588192929

    SHA1

    ab440a3bcec5e15203e66726555dca6e356029f8

    SHA256

    db033b1fc4db198024870bdd8d66382da33c1dd97c872eca2ae29fc71df9fdb9

    SHA512

    a3b9e2023f34911c2c00fd1653fefca8477905f6fe232495708e41eacad8fdfb42b1b667c0d2403bcd5789b6faf7d801af84d2f9e48040af26dbe0ada4e1b5e3

  • C:\Users\Admin\AppData\Local\WINDOWS\SERVICES.EXE

    Filesize

    45KB

    MD5

    dc704cfe8f13dbdd4a234f1eb66298e8

    SHA1

    70e3522dd557a9c75124fa3d539bcff2892310f8

    SHA256

    b7331c9cdf6f331f56110f03916b3efbc2207b6d169c6654b7e1425f14f161c4

    SHA512

    aefe7e3f74ac29e66faa54263356bdc9c89992de937a9fa46cbe58691cb5187a15a039ab77987f4800265d1e6b89890c26ff6b58085f9d21613b85b181b9b467

  • C:\Users\Admin\AppData\Local\WINDOWS\WINLOGON.EXE

    Filesize

    45KB

    MD5

    e591d1cfadfe8e3e7935745c3bffb0fd

    SHA1

    a031db59b626b21f84a0a508a5a25a30b94532da

    SHA256

    bf6dbb1648a3ff16278ea589fedd5a7838b4d2806cb4a3efe2777bd7bba17a19

    SHA512

    a21df58bc6b9db2a6212e4c7534fbb3a7c288594ae13aa7fa0924c907293e5e75fab84119173356c0020ddcf49563ca49c25f7f9b08e69f03cdaf82c523164e9

  • C:\Users\Admin\AppData\Local\winlogon.exe

    Filesize

    45KB

    MD5

    db9033e7597d4b6374687f905b6c7a90

    SHA1

    56f3230e7e082e18bcb6f029a095f3bab0a643f3

    SHA256

    ca190b44f75e56c761bdac39808ba488b84d948ff761d21e7ebe66a430bc9727

    SHA512

    92767b84372e6ebfb3190f868888a816f58a230fc5c6d180be37e316219591367fcc8b0061597fb25e0b3c5e2fe43305f3b7310f45bcd3f8e30ad7e4667f8eb7

  • C:\Windows\SysWOW64\IExplorer.exe

    Filesize

    45KB

    MD5

    6eb5be5fcaa4d3daed146166b98fb672

    SHA1

    baab0baca65bfb5809536fa9803230e46b4e39fb

    SHA256

    290eafd13704d262589b94a2a4ede563e56f2667147ea6b3d5260e808902e079

    SHA512

    cc0ed83287b3243b9703e77afc2dc69ddabb76ee16ef42fa34b613d11b006a8de6ea1bb890aea18e6ea75bcb9fb6148506d7b35e78f619546a699069d96f63d9

  • C:\Windows\xk.exe

    Filesize

    45KB

    MD5

    54bd95163ef156154a1ecdab82871130

    SHA1

    9a0344929e6f247153510a340eacc83caec6db33

    SHA256

    1baef67a85f2bf5ec53a8edf1126bd9dd46479ce7a9e197a0f8c2f022b1708d7

    SHA512

    e617ee51ce197898a18f9b8d50c1ecd0a1781685430b15180d7eab3c0ed8d40fef98c0674d45a2490eeb11a12e3b55d095e02f676c482abe972f8305a0c64cd2

  • memory/708-120-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2128-124-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2168-112-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2508-151-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/2808-139-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/3916-131-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/4412-146-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/4848-0-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/4848-152-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB