Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:44
Static task
static1
Behavioral task
behavioral1
Sample
Worm.Win32.Ludbaruma.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Worm.Win32.Ludbaruma.exe
Resource
win10v2004-20240802-en
General
-
Target
Worm.Win32.Ludbaruma.exe
-
Size
45KB
-
MD5
db9033e7597d4b6374687f905b6c7a90
-
SHA1
56f3230e7e082e18bcb6f029a095f3bab0a643f3
-
SHA256
ca190b44f75e56c761bdac39808ba488b84d948ff761d21e7ebe66a430bc9727
-
SHA512
92767b84372e6ebfb3190f868888a816f58a230fc5c6d180be37e316219591367fcc8b0061597fb25e0b3c5e2fe43305f3b7310f45bcd3f8e30ad7e4667f8eb7
-
SSDEEP
768:/mFQj8rM9whcqet8Wfb4JzRJwEIHU5U3rf12WmULgJs7DFK+5nEOK:1AwEmBT4JzRJwEeUW7f12xULgJzOK
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" Worm.Win32.Ludbaruma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" Worm.Win32.Ludbaruma.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Worm.Win32.Ludbaruma.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Worm.Win32.Ludbaruma.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Worm.Win32.Ludbaruma.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Worm.Win32.Ludbaruma.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 7 IoCs
pid Process 2168 xk.exe 708 IExplorer.exe 2128 WINLOGON.EXE 3916 CSRSS.EXE 2808 SERVICES.EXE 4412 LSASS.EXE 2508 SMSS.EXE -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" Worm.Win32.Ludbaruma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Worm.Win32.Ludbaruma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Worm.Win32.Ludbaruma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Worm.Win32.Ludbaruma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Worm.Win32.Ludbaruma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Worm.Win32.Ludbaruma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Worm.Win32.Ludbaruma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open Worm.Win32.Ludbaruma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Worm.Win32.Ludbaruma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Worm.Win32.Ludbaruma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command Worm.Win32.Ludbaruma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell Worm.Win32.Ludbaruma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command Worm.Win32.Ludbaruma.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" Worm.Win32.Ludbaruma.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" Worm.Win32.Ludbaruma.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" Worm.Win32.Ludbaruma.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" Worm.Win32.Ludbaruma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" Worm.Win32.Ludbaruma.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\shell.exe Worm.Win32.Ludbaruma.exe File created C:\Windows\SysWOW64\shell.exe Worm.Win32.Ludbaruma.exe File created C:\Windows\SysWOW64\Mig2.scr Worm.Win32.Ludbaruma.exe File created C:\Windows\SysWOW64\IExplorer.exe Worm.Win32.Ludbaruma.exe File opened for modification C:\Windows\SysWOW64\IExplorer.exe Worm.Win32.Ludbaruma.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr Worm.Win32.Ludbaruma.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\xk.exe Worm.Win32.Ludbaruma.exe File created C:\Windows\xk.exe Worm.Win32.Ludbaruma.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SMSS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Worm.Win32.Ludbaruma.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINLOGON.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CSRSS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVICES.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LSASS.EXE -
Modifies Control Panel 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" Worm.Win32.Ludbaruma.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" Worm.Win32.Ludbaruma.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" Worm.Win32.Ludbaruma.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\Desktop\ Worm.Win32.Ludbaruma.exe -
Modifies registry class 15 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile Worm.Win32.Ludbaruma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell Worm.Win32.Ludbaruma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Worm.Win32.Ludbaruma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Worm.Win32.Ludbaruma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command Worm.Win32.Ludbaruma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Worm.Win32.Ludbaruma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command Worm.Win32.Ludbaruma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Worm.Win32.Ludbaruma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Worm.Win32.Ludbaruma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Worm.Win32.Ludbaruma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" Worm.Win32.Ludbaruma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Worm.Win32.Ludbaruma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile Worm.Win32.Ludbaruma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open Worm.Win32.Ludbaruma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Worm.Win32.Ludbaruma.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4848 Worm.Win32.Ludbaruma.exe 4848 Worm.Win32.Ludbaruma.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4848 Worm.Win32.Ludbaruma.exe 2168 xk.exe 708 IExplorer.exe 2128 WINLOGON.EXE 3916 CSRSS.EXE 2808 SERVICES.EXE 4412 LSASS.EXE 2508 SMSS.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4848 wrote to memory of 2168 4848 Worm.Win32.Ludbaruma.exe 82 PID 4848 wrote to memory of 2168 4848 Worm.Win32.Ludbaruma.exe 82 PID 4848 wrote to memory of 2168 4848 Worm.Win32.Ludbaruma.exe 82 PID 4848 wrote to memory of 708 4848 Worm.Win32.Ludbaruma.exe 83 PID 4848 wrote to memory of 708 4848 Worm.Win32.Ludbaruma.exe 83 PID 4848 wrote to memory of 708 4848 Worm.Win32.Ludbaruma.exe 83 PID 4848 wrote to memory of 2128 4848 Worm.Win32.Ludbaruma.exe 84 PID 4848 wrote to memory of 2128 4848 Worm.Win32.Ludbaruma.exe 84 PID 4848 wrote to memory of 2128 4848 Worm.Win32.Ludbaruma.exe 84 PID 4848 wrote to memory of 3916 4848 Worm.Win32.Ludbaruma.exe 85 PID 4848 wrote to memory of 3916 4848 Worm.Win32.Ludbaruma.exe 85 PID 4848 wrote to memory of 3916 4848 Worm.Win32.Ludbaruma.exe 85 PID 4848 wrote to memory of 2808 4848 Worm.Win32.Ludbaruma.exe 86 PID 4848 wrote to memory of 2808 4848 Worm.Win32.Ludbaruma.exe 86 PID 4848 wrote to memory of 2808 4848 Worm.Win32.Ludbaruma.exe 86 PID 4848 wrote to memory of 4412 4848 Worm.Win32.Ludbaruma.exe 87 PID 4848 wrote to memory of 4412 4848 Worm.Win32.Ludbaruma.exe 87 PID 4848 wrote to memory of 4412 4848 Worm.Win32.Ludbaruma.exe 87 PID 4848 wrote to memory of 2508 4848 Worm.Win32.Ludbaruma.exe 88 PID 4848 wrote to memory of 2508 4848 Worm.Win32.Ludbaruma.exe 88 PID 4848 wrote to memory of 2508 4848 Worm.Win32.Ludbaruma.exe 88 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer Worm.Win32.Ludbaruma.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" Worm.Win32.Ludbaruma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Worm.Win32.Ludbaruma.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Worm.Win32.Ludbaruma.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Worm.Win32.Ludbaruma.exe"C:\Users\Admin\AppData\Local\Temp\Worm.Win32.Ludbaruma.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4848 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2168
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:708
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2128
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3916
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2808
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4412
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2508
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD54ff9b32cbffae48f7a62a71aa6e45487
SHA16aedde19cc614464619d3964b0c84d49d94c5891
SHA25633f2a1e3468f732666cc119699ae1380a6328f50f0c7676909ec71d130d8b8fd
SHA51231726d288a942abf5caa5f75f8ba5c9698b1d08a5d3d9bcef0b7d21a21f3944c645098f049eb7ee3f7a289b394a29327bb307a0d4e6439c93303c8290d9baa94
-
Filesize
45KB
MD518cebf2b1153f6aa3be013d588192929
SHA1ab440a3bcec5e15203e66726555dca6e356029f8
SHA256db033b1fc4db198024870bdd8d66382da33c1dd97c872eca2ae29fc71df9fdb9
SHA512a3b9e2023f34911c2c00fd1653fefca8477905f6fe232495708e41eacad8fdfb42b1b667c0d2403bcd5789b6faf7d801af84d2f9e48040af26dbe0ada4e1b5e3
-
Filesize
45KB
MD5dc704cfe8f13dbdd4a234f1eb66298e8
SHA170e3522dd557a9c75124fa3d539bcff2892310f8
SHA256b7331c9cdf6f331f56110f03916b3efbc2207b6d169c6654b7e1425f14f161c4
SHA512aefe7e3f74ac29e66faa54263356bdc9c89992de937a9fa46cbe58691cb5187a15a039ab77987f4800265d1e6b89890c26ff6b58085f9d21613b85b181b9b467
-
Filesize
45KB
MD5e591d1cfadfe8e3e7935745c3bffb0fd
SHA1a031db59b626b21f84a0a508a5a25a30b94532da
SHA256bf6dbb1648a3ff16278ea589fedd5a7838b4d2806cb4a3efe2777bd7bba17a19
SHA512a21df58bc6b9db2a6212e4c7534fbb3a7c288594ae13aa7fa0924c907293e5e75fab84119173356c0020ddcf49563ca49c25f7f9b08e69f03cdaf82c523164e9
-
Filesize
45KB
MD5db9033e7597d4b6374687f905b6c7a90
SHA156f3230e7e082e18bcb6f029a095f3bab0a643f3
SHA256ca190b44f75e56c761bdac39808ba488b84d948ff761d21e7ebe66a430bc9727
SHA51292767b84372e6ebfb3190f868888a816f58a230fc5c6d180be37e316219591367fcc8b0061597fb25e0b3c5e2fe43305f3b7310f45bcd3f8e30ad7e4667f8eb7
-
Filesize
45KB
MD56eb5be5fcaa4d3daed146166b98fb672
SHA1baab0baca65bfb5809536fa9803230e46b4e39fb
SHA256290eafd13704d262589b94a2a4ede563e56f2667147ea6b3d5260e808902e079
SHA512cc0ed83287b3243b9703e77afc2dc69ddabb76ee16ef42fa34b613d11b006a8de6ea1bb890aea18e6ea75bcb9fb6148506d7b35e78f619546a699069d96f63d9
-
Filesize
45KB
MD554bd95163ef156154a1ecdab82871130
SHA19a0344929e6f247153510a340eacc83caec6db33
SHA2561baef67a85f2bf5ec53a8edf1126bd9dd46479ce7a9e197a0f8c2f022b1708d7
SHA512e617ee51ce197898a18f9b8d50c1ecd0a1781685430b15180d7eab3c0ed8d40fef98c0674d45a2490eeb11a12e3b55d095e02f676c482abe972f8305a0c64cd2