Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 17:13
Static task
static1
Behavioral task
behavioral1
Sample
letsvpn3.10.4Install.exe
Resource
win7-20240903-en
General
-
Target
letsvpn3.10.4Install.exe
-
Size
15.3MB
-
MD5
9e07c23a29b69024cc8cd6b0ee856b6c
-
SHA1
c0a6c67d609c9d4adcb3b2b13f65e5eda0c9fbeb
-
SHA256
918bc31cba93f294e71233e9b029705706175be78ca6fff523fb4b5ba87dbfce
-
SHA512
3b45a5d1657d18c336df7c64eac1a6b365a7d881a22d6d30944c3d2a8b994e0d07c2a0a91afd6999b6d559abc0ae29d065a95c55ac7b0a74e3d77e2f257d11dc
-
SSDEEP
393216:qE9AqYuf1pK6o217nb2LLhY8iuakhNrjcJp:3tf1ppzsLhHiEoJp
Malware Config
Extracted
Protocol: ftp- Host:
134.122.155.46 - Port:
21 - Username:
lz165404 - Password:
lz165404.
Signatures
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" GPUChecker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" GPUChecker.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation letsvpn3.10.4Install.tmp -
Executes dropped EXE 3 IoCs
pid Process 1572 letsvpn3.10.4Install.tmp 4556 GPUChecker.exe 4888 letsvpn-3.10.3.exe -
Loads dropped DLL 3 IoCs
pid Process 4888 letsvpn-3.10.3.exe 4888 letsvpn-3.10.3.exe 4888 letsvpn-3.10.3.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: GPUChecker.exe File opened (read-only) \??\O: GPUChecker.exe File opened (read-only) \??\P: GPUChecker.exe File opened (read-only) \??\S: GPUChecker.exe File opened (read-only) \??\V: GPUChecker.exe File opened (read-only) \??\X: GPUChecker.exe File opened (read-only) \??\E: GPUChecker.exe File opened (read-only) \??\G: GPUChecker.exe File opened (read-only) \??\H: GPUChecker.exe File opened (read-only) \??\M: GPUChecker.exe File opened (read-only) \??\T: GPUChecker.exe File opened (read-only) \??\W: GPUChecker.exe File opened (read-only) \??\Z: GPUChecker.exe File opened (read-only) \??\B: GPUChecker.exe File opened (read-only) \??\I: GPUChecker.exe File opened (read-only) \??\J: GPUChecker.exe File opened (read-only) \??\L: GPUChecker.exe File opened (read-only) \??\N: GPUChecker.exe File opened (read-only) \??\Y: GPUChecker.exe File opened (read-only) \??\Q: GPUChecker.exe File opened (read-only) \??\R: GPUChecker.exe File opened (read-only) \??\U: GPUChecker.exe -
pid Process 3704 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language letsvpn3.10.4Install.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language letsvpn3.10.4Install.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language letsvpn-3.10.3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ GPUChecker.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString GPUChecker.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 1572 letsvpn3.10.4Install.tmp 1572 letsvpn3.10.4Install.tmp 3704 powershell.exe 3704 powershell.exe 4556 GPUChecker.exe 4556 GPUChecker.exe 4556 GPUChecker.exe 4556 GPUChecker.exe 4556 GPUChecker.exe 4556 GPUChecker.exe 4556 GPUChecker.exe 4556 GPUChecker.exe 4556 GPUChecker.exe 4556 GPUChecker.exe 4556 GPUChecker.exe 4556 GPUChecker.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4556 GPUChecker.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3704 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1572 letsvpn3.10.4Install.tmp -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4556 GPUChecker.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3944 wrote to memory of 1572 3944 letsvpn3.10.4Install.exe 82 PID 3944 wrote to memory of 1572 3944 letsvpn3.10.4Install.exe 82 PID 3944 wrote to memory of 1572 3944 letsvpn3.10.4Install.exe 82 PID 1572 wrote to memory of 4556 1572 letsvpn3.10.4Install.tmp 83 PID 1572 wrote to memory of 4556 1572 letsvpn3.10.4Install.tmp 83 PID 1572 wrote to memory of 4888 1572 letsvpn3.10.4Install.tmp 84 PID 1572 wrote to memory of 4888 1572 letsvpn3.10.4Install.tmp 84 PID 1572 wrote to memory of 4888 1572 letsvpn3.10.4Install.tmp 84 PID 4888 wrote to memory of 3704 4888 letsvpn-3.10.3.exe 87 PID 4888 wrote to memory of 3704 4888 letsvpn-3.10.3.exe 87 PID 4888 wrote to memory of 3704 4888 letsvpn-3.10.3.exe 87 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" GPUChecker.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" GPUChecker.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\letsvpn3.10.4Install.exe"C:\Users\Admin\AppData\Local\Temp\letsvpn3.10.4Install.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\is-6RD2J.tmp\letsvpn3.10.4Install.tmp"C:\Users\Admin\AppData\Local\Temp\is-6RD2J.tmp\letsvpn3.10.4Install.tmp" /SL5="$902C8,15722891,215552,C:\Users\Admin\AppData\Local\Temp\letsvpn3.10.4Install.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Public\Documents\GPUChecker.exe"C:\Users\Public\Documents\GPUChecker.exe"3⤵
- UAC bypass
- Executes dropped EXE
- Enumerates connected drives
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:4556
-
-
C:\Users\Admin\AppData\Local\Temp\is-JMHLR.tmp\letsvpn-3.10.3.exe"C:\Users\Admin\AppData\Local\Temp\is-JMHLR.tmp\letsvpn-3.10.3.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -inputformat none -ExecutionPolicy Bypass -Command "If ($env:PROCESSOR_ARCHITEW6432) { $env:PROCESSOR_ARCHITEW6432 } Else { $env:PROCESSOR_ARCHITECTURE }"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3704
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
921KB
MD52a1ea1b44013863f7f1d92ff89f80177
SHA166a2f0c14d7692e5cec40ca54b81328519c0f10c
SHA256c9c04dbc019a9d36fbba1acd0e659eaa13ee7522cc67dd9a82e887abd25b0d4a
SHA512aef8e28aa281e36801d38883b9af8cfd99b764afd28df9b1f32a9688fe3369bef33af0043fd77c23a8a5a055533d57905f01646db957a6772a972f5148393099
-
Filesize
14.5MB
MD5554754b512298e76d45c17de7808e6c2
SHA1d0b69dd1996cf103a15fee3e0fe1bc1277c7f412
SHA256aafb3b7ff217393b7b6beba02b3bcee9c076b63bcc78e2cc273c3e6d1092f3c1
SHA512430c6d9fb4616c506f1d5e510c2b2f4451f86afac43c588956e703565a4404b7a31973b2d0767eb3e27d9e9430da021af90c63dd10750ecc0459950ddf66bd9f
-
Filesize
11KB
MD575ed96254fbf894e42058062b4b4f0d1
SHA1996503f1383b49021eb3427bc28d13b5bbd11977
SHA256a632d74332b3f08f834c732a103dafeb09a540823a2217ca7f49159755e8f1d7
SHA51258174896db81d481947b8745dafe3a02c150f3938bb4543256e8cce1145154e016d481df9fe68dac6d48407c62cbe20753320ebd5fe5e84806d07ce78e0eb0c4
-
Filesize
9KB
MD5ca95c9da8cef7062813b989ab9486201
SHA1c555af25df3de51aa18d487d47408d5245dba2d1
SHA256feb6364375d0ab081e9cdf11271c40cb966af295c600903383b0730f0821c0be
SHA512a30d94910204d1419c803dc12d90a9d22f63117e4709b1a131d8c4d5ead7e4121150e2c8b004a546b33c40c294df0a74567013001f55f37147d86bb847d7bbc9
-
Filesize
6KB
MD53d366250fcf8b755fce575c75f8c79e4
SHA12ebac7df78154738d41aac8e27d7a0e482845c57
SHA2568bdd996ae4778c6f829e2bcb651c55efc9ec37eeea17d259e013b39528dddbb6
SHA51267d2d88de625227ccd2cb406b4ac3a215d1770d385c985a44e2285490f49b45f23ce64745b24444e2a0f581335fda02e913b92781043e8dfd287844435ba9094
-
Filesize
838KB
MD5d0e0461bc0a130c622013f61e35aff6d
SHA1715c1c5f403d7d1a9831be878e1d2a3910bc4f3e
SHA256d274787942d562893a74ebbfd28285e0c292ba50bed479038c90c0d2d21e368a
SHA51298d5043162a4e6a6c6a61026c6e5367bf43ad8eba9078e4818697d3aaac4c523f73777ea7cf803a87e81794d13e89ca1a484409c0ab7d9057c4ece43fa13802f