Analysis
-
max time kernel
133s -
max time network
145s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
18-10-2024 04:40
Behavioral task
behavioral1
Sample
LoPi.exe
Resource
win10-20240404-en
General
-
Target
LoPi.exe
-
Size
9.9MB
-
MD5
1abd63f11821dd425441e659c890632b
-
SHA1
e4772d6e84217f0c0ff15aa5580a13f3424d2ac0
-
SHA256
5dc88f47dfefad9feb60493de86d4bbdd407b158f4b6c768759e726ce497754f
-
SHA512
29eeab5c7c06b83f0557a375c3faf1fd868dfb2d89f2035728197a45bcb664e951fabfbb5191857beb576a8de3a009aef2f7a760d52305c14c754573e9d3b06e
-
SSDEEP
98304:hzU4brhxBASgf/gEpiji6Ig8TWA7EIICafZm/mbnXg:hxrhxBAGZji6IdThoRTXg
Malware Config
Extracted
skuld
https://discord.com/api/webhooks/1296197362108338248/k492vQ1I3SDXcmvWcvsy2EcSUzrwhNmILrYhR3qSF8R7tkcE-C5GgZSxuS3IlNschBWg
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-873560699-1074803302-2326074425-1000\Software\Microsoft\Windows\CurrentVersion\Run\Realtek HD Audio Universal Service = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Protect\\SecurityHealthSystray.exe" LoPi.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 1 api.ipify.org 2 api.ipify.org -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeDebugPrivilege 500 LoPi.exe Token: SeIncreaseQuotaPrivilege 4672 wmic.exe Token: SeSecurityPrivilege 4672 wmic.exe Token: SeTakeOwnershipPrivilege 4672 wmic.exe Token: SeLoadDriverPrivilege 4672 wmic.exe Token: SeSystemProfilePrivilege 4672 wmic.exe Token: SeSystemtimePrivilege 4672 wmic.exe Token: SeProfSingleProcessPrivilege 4672 wmic.exe Token: SeIncBasePriorityPrivilege 4672 wmic.exe Token: SeCreatePagefilePrivilege 4672 wmic.exe Token: SeBackupPrivilege 4672 wmic.exe Token: SeRestorePrivilege 4672 wmic.exe Token: SeShutdownPrivilege 4672 wmic.exe Token: SeDebugPrivilege 4672 wmic.exe Token: SeSystemEnvironmentPrivilege 4672 wmic.exe Token: SeRemoteShutdownPrivilege 4672 wmic.exe Token: SeUndockPrivilege 4672 wmic.exe Token: SeManageVolumePrivilege 4672 wmic.exe Token: 33 4672 wmic.exe Token: 34 4672 wmic.exe Token: 35 4672 wmic.exe Token: 36 4672 wmic.exe Token: SeIncreaseQuotaPrivilege 4672 wmic.exe Token: SeSecurityPrivilege 4672 wmic.exe Token: SeTakeOwnershipPrivilege 4672 wmic.exe Token: SeLoadDriverPrivilege 4672 wmic.exe Token: SeSystemProfilePrivilege 4672 wmic.exe Token: SeSystemtimePrivilege 4672 wmic.exe Token: SeProfSingleProcessPrivilege 4672 wmic.exe Token: SeIncBasePriorityPrivilege 4672 wmic.exe Token: SeCreatePagefilePrivilege 4672 wmic.exe Token: SeBackupPrivilege 4672 wmic.exe Token: SeRestorePrivilege 4672 wmic.exe Token: SeShutdownPrivilege 4672 wmic.exe Token: SeDebugPrivilege 4672 wmic.exe Token: SeSystemEnvironmentPrivilege 4672 wmic.exe Token: SeRemoteShutdownPrivilege 4672 wmic.exe Token: SeUndockPrivilege 4672 wmic.exe Token: SeManageVolumePrivilege 4672 wmic.exe Token: 33 4672 wmic.exe Token: 34 4672 wmic.exe Token: 35 4672 wmic.exe Token: 36 4672 wmic.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 500 wrote to memory of 4936 500 LoPi.exe 76 PID 500 wrote to memory of 4936 500 LoPi.exe 76 PID 500 wrote to memory of 4412 500 LoPi.exe 77 PID 500 wrote to memory of 4412 500 LoPi.exe 77 PID 500 wrote to memory of 4672 500 LoPi.exe 78 PID 500 wrote to memory of 4672 500 LoPi.exe 78 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 4936 attrib.exe 4412 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\LoPi.exe"C:\Users\Admin\AppData\Local\Temp\LoPi.exe"1⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:500 -
C:\Windows\system32\attrib.exeattrib +h +s C:\Users\Admin\AppData\Local\Temp\LoPi.exe2⤵
- Views/modifies file attributes
PID:4936
-
-
C:\Windows\system32\attrib.exeattrib +h +s C:\Users\Admin\AppData\Roaming\Microsoft\Protect\SecurityHealthSystray.exe2⤵
- Views/modifies file attributes
PID:4412
-
-
C:\Windows\System32\Wbem\wmic.exewmic csproduct get UUID2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9.9MB
MD51abd63f11821dd425441e659c890632b
SHA1e4772d6e84217f0c0ff15aa5580a13f3424d2ac0
SHA2565dc88f47dfefad9feb60493de86d4bbdd407b158f4b6c768759e726ce497754f
SHA51229eeab5c7c06b83f0557a375c3faf1fd868dfb2d89f2035728197a45bcb664e951fabfbb5191857beb576a8de3a009aef2f7a760d52305c14c754573e9d3b06e