Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 09:34
Static task
static1
Behavioral task
behavioral1
Sample
Worm.Win32.Ludbaruma.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Worm.Win32.Ludbaruma.exe
Resource
win10v2004-20240802-en
General
-
Target
Worm.Win32.Ludbaruma.exe
-
Size
91KB
-
MD5
873ef5c05d08ea689a7089b2587d2330
-
SHA1
9aba971d627abf02ea1e0b00600912eb0f8626a5
-
SHA256
806ff5a4291ace6371cfa09d584567b7d652d7b28c167a5ab9c4115e9aa4e1f7
-
SHA512
f92df22b69780ace53fbe815b066b3dbaabe56b4f697375c6627be513ef6799f05eeb70ced00bde6c05836bd8dfb467044889af33cd37d2abf699d3aecba9b15
-
SSDEEP
1536:FAwEmBGz1lNNqDaG0PoxhlzmnAwEmBGz1lNNqDaG0Poxhlzm/:FGmUXNQDaG0A8nGmUXNQDaG0A8/
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\system32\\IExplorer.exe\"" Worm.Win32.Ludbaruma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\IExplorer.exe" Worm.Win32.Ludbaruma.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Worm.Win32.Ludbaruma.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Worm.Win32.Ludbaruma.exe -
Disables RegEdit via registry modification 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Worm.Win32.Ludbaruma.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Worm.Win32.Ludbaruma.exe -
Disables use of System Restore points 1 TTPs
-
Executes dropped EXE 7 IoCs
pid Process 4672 xk.exe 3152 IExplorer.exe 4128 WINLOGON.EXE 1280 CSRSS.EXE 1504 SERVICES.EXE 512 LSASS.EXE 4364 SMSS.EXE -
Modifies system executable filetype association 2 TTPs 13 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open Worm.Win32.Ludbaruma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" Worm.Win32.Ludbaruma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Worm.Win32.Ludbaruma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Worm.Win32.Ludbaruma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell Worm.Win32.Ludbaruma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Worm.Win32.Ludbaruma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command Worm.Win32.Ludbaruma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Worm.Win32.Ludbaruma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Worm.Win32.Ludbaruma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command Worm.Win32.Ludbaruma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Worm.Win32.Ludbaruma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Worm.Win32.Ludbaruma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Worm.Win32.Ludbaruma.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSMSGS = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\WINLOGON.EXE" Worm.Win32.Ludbaruma.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ServiceAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\SERVICES.EXE" Worm.Win32.Ludbaruma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\LogonAdmin = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\CSRSS.EXE" Worm.Win32.Ludbaruma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System Monitoring = "C:\\Users\\Admin\\Local Settings\\Application Data\\WINDOWS\\LSASS.EXE" Worm.Win32.Ludbaruma.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\xk = "C:\\Windows\\xk.exe" Worm.Win32.Ludbaruma.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\IExplorer.exe Worm.Win32.Ludbaruma.exe File opened for modification C:\Windows\SysWOW64\Mig2.scr Worm.Win32.Ludbaruma.exe File opened for modification C:\Windows\SysWOW64\shell.exe Worm.Win32.Ludbaruma.exe File created C:\Windows\SysWOW64\shell.exe Worm.Win32.Ludbaruma.exe File created C:\Windows\SysWOW64\Mig2.scr Worm.Win32.Ludbaruma.exe File created C:\Windows\SysWOW64\IExplorer.exe Worm.Win32.Ludbaruma.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\xk.exe Worm.Win32.Ludbaruma.exe File created C:\Windows\xk.exe Worm.Win32.Ludbaruma.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SMSS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Worm.Win32.Ludbaruma.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IExplorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINLOGON.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CSRSS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SERVICES.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LSASS.EXE -
Modifies Control Panel 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\system32\\Mig~mig.SCR" Worm.Win32.Ludbaruma.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\Desktop\ScreenSaverIsSecure = "0" Worm.Win32.Ludbaruma.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\Desktop\ScreenSaveTimeOut = "600" Worm.Win32.Ludbaruma.exe Key created \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\Desktop\ Worm.Win32.Ludbaruma.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Worm.Win32.Ludbaruma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command Worm.Win32.Ludbaruma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "File Folder" Worm.Win32.Ludbaruma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command Worm.Win32.Ludbaruma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\batfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Worm.Win32.Ludbaruma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command Worm.Win32.Ludbaruma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command Worm.Win32.Ludbaruma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open Worm.Win32.Ludbaruma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\piffile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Worm.Win32.Ludbaruma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\comfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Worm.Win32.Ludbaruma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile Worm.Win32.Ludbaruma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command Worm.Win32.Ludbaruma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell Worm.Win32.Ludbaruma.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shell\open\command\ = "\"C:\\Windows\\system32\\shell.exe\" \"%1\" %*" Worm.Win32.Ludbaruma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile Worm.Win32.Ludbaruma.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4276 Worm.Win32.Ludbaruma.exe 4276 Worm.Win32.Ludbaruma.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4276 Worm.Win32.Ludbaruma.exe 4672 xk.exe 3152 IExplorer.exe 4128 WINLOGON.EXE 1280 CSRSS.EXE 1504 SERVICES.EXE 512 LSASS.EXE 4364 SMSS.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4276 wrote to memory of 4672 4276 Worm.Win32.Ludbaruma.exe 82 PID 4276 wrote to memory of 4672 4276 Worm.Win32.Ludbaruma.exe 82 PID 4276 wrote to memory of 4672 4276 Worm.Win32.Ludbaruma.exe 82 PID 4276 wrote to memory of 3152 4276 Worm.Win32.Ludbaruma.exe 83 PID 4276 wrote to memory of 3152 4276 Worm.Win32.Ludbaruma.exe 83 PID 4276 wrote to memory of 3152 4276 Worm.Win32.Ludbaruma.exe 83 PID 4276 wrote to memory of 4128 4276 Worm.Win32.Ludbaruma.exe 84 PID 4276 wrote to memory of 4128 4276 Worm.Win32.Ludbaruma.exe 84 PID 4276 wrote to memory of 4128 4276 Worm.Win32.Ludbaruma.exe 84 PID 4276 wrote to memory of 1280 4276 Worm.Win32.Ludbaruma.exe 85 PID 4276 wrote to memory of 1280 4276 Worm.Win32.Ludbaruma.exe 85 PID 4276 wrote to memory of 1280 4276 Worm.Win32.Ludbaruma.exe 85 PID 4276 wrote to memory of 1504 4276 Worm.Win32.Ludbaruma.exe 86 PID 4276 wrote to memory of 1504 4276 Worm.Win32.Ludbaruma.exe 86 PID 4276 wrote to memory of 1504 4276 Worm.Win32.Ludbaruma.exe 86 PID 4276 wrote to memory of 512 4276 Worm.Win32.Ludbaruma.exe 87 PID 4276 wrote to memory of 512 4276 Worm.Win32.Ludbaruma.exe 87 PID 4276 wrote to memory of 512 4276 Worm.Win32.Ludbaruma.exe 87 PID 4276 wrote to memory of 4364 4276 Worm.Win32.Ludbaruma.exe 88 PID 4276 wrote to memory of 4364 4276 Worm.Win32.Ludbaruma.exe 88 PID 4276 wrote to memory of 4364 4276 Worm.Win32.Ludbaruma.exe 88 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System Worm.Win32.Ludbaruma.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" Worm.Win32.Ludbaruma.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer Worm.Win32.Ludbaruma.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\NoFolderOptions = "1" Worm.Win32.Ludbaruma.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Worm.Win32.Ludbaruma.exe"C:\Users\Admin\AppData\Local\Temp\Worm.Win32.Ludbaruma.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Modifies system executable filetype association
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4276 -
C:\Windows\xk.exeC:\Windows\xk.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4672
-
-
C:\Windows\SysWOW64\IExplorer.exeC:\Windows\system32\IExplorer.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3152
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\WINLOGON.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4128
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\CSRSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1280
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SERVICES.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1504
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\LSASS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:512
-
-
C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"C:\Users\Admin\Local Settings\Application Data\WINDOWS\SMSS.EXE"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4364
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Event Triggered Execution
1Change Default File Association
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91KB
MD55b0a945ac69d64fd957a5eb138947492
SHA15e93992549f9a7ed16f916398423ec943ed43696
SHA2565e50c86e4c3fe7fc8e829c7e68387d921b3cebdf6f76393bf24381b394c8f439
SHA5124187db27c0d3a05405cd2e84425334449894ed889bcebbbcfca7a3a8b7ccb26a47b82b525930afab59504bb19a9fac3799d8e70859fb13bc1efeb3ef875d8dfb
-
Filesize
91KB
MD5eb1554eafd4e99ff836f2699d5cf81b4
SHA147683b96399b8aac454ff92a9e8dc2fe2607cb50
SHA256bc7e6728b3cddc26a0a4edbacaeec6329f9956aa8ea7280446426f8e67dc65e5
SHA5122d119f242758c623cd317667ea56c2e60f8c035e7cb413ca8f0a857d47b8437230d5aafc0565bd353eb7fb543a84ff45bb834ff4650ffdd23d4bf1e021272094
-
Filesize
91KB
MD55c9b728ccfe26eb8874074eab5a8b61b
SHA1bef23a54a6904683a46750e3752d781b906b9a47
SHA25619045bf4148cfa7859abe18b66bf847222da3ddaa6ca7baf12669a9cf7d6c08a
SHA512a6383fcd1ca3a9fb4d578ae3712538825f20b271d04b1e33a61cb9eac4ea4a6722607ea4ac5a74f738e7e685526173fc842658586f412aca44e475f50b968195
-
Filesize
91KB
MD5a6bed34aa42cef55fc54ea1d073702b4
SHA1e0ab286b735f3da7d3341b97cf1320503ae500a1
SHA2560ed68060ee0996bb53f5aef5b568017fbc22f8c8f9f7ce7382d173e1bd541758
SHA5120ead44a7f76fdae7fce9debf12ff8d86536ab588683e585dd60abb9cd69f9aa30f603cfc8b6e00a03670c53e52068a485e8fcea11e02260941937228b2824c48
-
Filesize
91KB
MD5873ef5c05d08ea689a7089b2587d2330
SHA19aba971d627abf02ea1e0b00600912eb0f8626a5
SHA256806ff5a4291ace6371cfa09d584567b7d652d7b28c167a5ab9c4115e9aa4e1f7
SHA512f92df22b69780ace53fbe815b066b3dbaabe56b4f697375c6627be513ef6799f05eeb70ced00bde6c05836bd8dfb467044889af33cd37d2abf699d3aecba9b15
-
Filesize
91KB
MD5b4d4fd1aa2fb4463910bb5ae49dda4e8
SHA19795b361ac436970b8fab8b5bf9be4d8ef0601e5
SHA2563d8833281a180070ee2b03a1a59d1d7ed217b2fd381dc482ed878cd62e90bddd
SHA5121960d3c3672f9d778a7a234c70c1ee2fe68d1dc29eb68d3195895da716dfbb3417cb17103561ad616bfa0a8cab84d7e0dda28b62f6eb417270e209a9c1aaa9ff
-
Filesize
91KB
MD509b81700eda23a7412425fb77b58955a
SHA1bc161acd24ad9d29dfeae3e05bdc418c69f37773
SHA256d9419ac54db979f68e32ede87f1cce50f3cfd99963e00108c81fb32cdf9d51dd
SHA5124f36a4ee0ac98816183e18e0656d10fd517d65e1dcb031b8e9350044ad521db7c1805eaf3460aa23fb7134e3f78131e49f64c31582c63893a3d2c78fe8787c34
-
Filesize
91KB
MD54cb99e36a1043b0230c0aa488222d72a
SHA1f1a5aebddc2356e7fd57494ac6bd27fe30e2910f
SHA256850b003839c6398801f065a37a2ae237cb0f6ba89724fbf1f9a86dad77a46635
SHA512c12977ddcaf7463efa3af605a5d3c45e6208524476c7f2ae9da98e6c5a1c4b312361fcbfc3615ecc26c14b2b5380b7e546a89aea48ba0f42d54eb5f1ed33f300