Overview
overview
10Static
static
10Randome.zip
windows11-21h2-x64
1GMAIL/Gmail.exe
windows11-21h2-x64
3Instagram VM.exe
windows11-21h2-x64
5LazyAIO/LazyAIO.exe
windows11-21h2-x64
7Minecraft/...ft.exe
windows11-21h2-x64
3Numify v3-...Or.exe
windows11-21h2-x64
3VenomRAT v...er.exe
windows11-21h2-x64
1VenomRAT v...nc.exe
windows11-21h2-x64
1VenomRAT v...ny.exe
windows11-21h2-x64
10VenomRAT v...p_.exe
windows11-21h2-x64
10VenomRAT v....3.exe
windows11-21h2-x64
10Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
27-09-2024 20:17
Behavioral task
behavioral1
Sample
Randome.zip
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
GMAIL/Gmail.exe
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
Instagram VM.exe
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
LazyAIO/LazyAIO.exe
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
Minecraft/Minecraft.exe
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
Numify v3-Cracked by SpArtOr.exe
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
VenomRAT v6.0.3_p_/Keylogger.exe
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
VenomRAT v6.0.3_p_/Plugins/hvnc.exe
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
VenomRAT v6.0.3_p_/Stub/ClientAny.exe
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
VenomRAT v6.0.3_p_/Venom RAT_p_.exe
Resource
win11-20240802-en
General
-
Target
LazyAIO/LazyAIO.exe
-
Size
14.0MB
-
MD5
912c7062ea2bcd72cfca56bda87bec61
-
SHA1
c7422d0ba5e3e191815bc23232591441b15dc6e8
-
SHA256
3cf5521e8fca62a2b14808f240766cf4ddcda830786457d24f1641e7c6ce9344
-
SHA512
9073e89b6711b06a7f98ab8bab5497921a8d04cdf5d3a3d176cbdd33c3e5e5069d3b071e669a23043d0954ff59592dff9781ce3f5cf58cb92e031d6a6f83fd95
-
SSDEEP
49152:j/T9XzcMurcgwdDpDzIysQimHDFz+bDSPgm3QeFmWWE1CC3Yur2+5aPPtKm9taTc:X9mtwi+1oYQymWFCCSHo65fX
Malware Config
Signatures
-
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral4/memory/4108-1-0x0000000000C30000-0x0000000001A2A000-memory.dmp agile_net -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4020 4108 WerFault.exe LazyAIO.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
LazyAIO.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LazyAIO.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
LazyAIO.exedescription pid process Token: SeDebugPrivilege 4108 LazyAIO.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\LazyAIO\LazyAIO.exe"C:\Users\Admin\AppData\Local\Temp\LazyAIO\LazyAIO.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4108 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4108 -s 21042⤵
- Program crash
PID:4020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4108 -ip 41081⤵PID:3628