Overview
overview
10Static
static
10GMAIL/Gmail.exe
windows11-21h2-x64
3GMAIL/Leaf.xNet.js
windows11-21h2-x64
3Instagram VM.exe
windows11-21h2-x64
6Randome/La...p_.rar
windows11-21h2-x64
3LazyAIO/LazyAIO.exe
windows11-21h2-x64
7Randome/Minecraft.rar
windows11-21h2-x64
3Minecraft/...ft.exe
windows11-21h2-x64
4VenomRAT v...nt.exe
windows11-21h2-x64
10Analysis
-
max time kernel
182s -
max time network
294s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
27-09-2024 20:25
Behavioral task
behavioral1
Sample
GMAIL/Gmail.exe
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
GMAIL/Leaf.xNet.js
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
Instagram VM.exe
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
Randome/LaxyAIO_p_.rar
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
LazyAIO/LazyAIO.exe
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
Randome/Minecraft.rar
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
Minecraft/Minecraft.exe
Resource
win11-20240802-en
General
-
Target
LazyAIO/LazyAIO.exe
-
Size
14.0MB
-
MD5
912c7062ea2bcd72cfca56bda87bec61
-
SHA1
c7422d0ba5e3e191815bc23232591441b15dc6e8
-
SHA256
3cf5521e8fca62a2b14808f240766cf4ddcda830786457d24f1641e7c6ce9344
-
SHA512
9073e89b6711b06a7f98ab8bab5497921a8d04cdf5d3a3d176cbdd33c3e5e5069d3b071e669a23043d0954ff59592dff9781ce3f5cf58cb92e031d6a6f83fd95
-
SSDEEP
49152:j/T9XzcMurcgwdDpDzIysQimHDFz+bDSPgm3QeFmWWE1CC3Yur2+5aPPtKm9taTc:X9mtwi+1oYQymWFCCSHo65fX
Malware Config
Signatures
-
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral5/memory/3220-1-0x0000000000E20000-0x0000000001C1A000-memory.dmp agile_net -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2216 3220 WerFault.exe LazyAIO.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
LazyAIO.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LazyAIO.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
LazyAIO.exedescription pid process Token: SeDebugPrivilege 3220 LazyAIO.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\LazyAIO\LazyAIO.exe"C:\Users\Admin\AppData\Local\Temp\LazyAIO\LazyAIO.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3220 -s 21522⤵
- Program crash
PID:2216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3220 -ip 32201⤵PID:3140