Malware Analysis Report

2024-12-01 01:19

Sample ID 241110-bwd12awjfw
Target 2024-11-10_57df77d33de042837069fecd75ee1e9c_avoslocker_hijackloader_luca-stealer
SHA256 e2c386624695ef1d3594ab3e94cc4e43af0e8373733a3c4447d69969cbbbf143
Tags
discovery
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

e2c386624695ef1d3594ab3e94cc4e43af0e8373733a3c4447d69969cbbbf143

Threat Level: Shows suspicious behavior

The file 2024-11-10_57df77d33de042837069fecd75ee1e9c_avoslocker_hijackloader_luca-stealer was found to be: Shows suspicious behavior.

Malicious Activity Summary

discovery

Checks computer location settings

Executes dropped EXE

Enumerates connected drives

Enumerates physical storage devices

System Location Discovery: System Language Discovery

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-10 01:29

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-10 01:29

Reported

2024-11-10 01:31

Platform

win7-20240708-en

Max time kernel

117s

Max time network

118s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2024-11-10_57df77d33de042837069fecd75ee1e9c_avoslocker_hijackloader_luca-stealer.exe"

Signatures

Executes dropped EXE

Description Indicator Process Target
N/A N/A F:\WZPDQ.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\2024-11-10_57df77d33de042837069fecd75ee1e9c_avoslocker_hijackloader_luca-stealer.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F:\WZPDQ.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A F:\WZPDQ.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2024-11-10_57df77d33de042837069fecd75ee1e9c_avoslocker_hijackloader_luca-stealer.exe N/A
Token: SeDebugPrivilege N/A F:\WZPDQ.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\2024-11-10_57df77d33de042837069fecd75ee1e9c_avoslocker_hijackloader_luca-stealer.exe

"C:\Users\Admin\AppData\Local\Temp\2024-11-10_57df77d33de042837069fecd75ee1e9c_avoslocker_hijackloader_luca-stealer.exe"

F:\WZPDQ.exe

"F:\WZPDQ.exe"

Network

N/A

Files

memory/1864-0-0x000000007474E000-0x000000007474F000-memory.dmp

memory/1864-1-0x0000000000CE0000-0x0000000001946000-memory.dmp

F:\WZPDQ.exe

MD5 57df77d33de042837069fecd75ee1e9c
SHA1 0215d7e4ef6da1a8e85bae4f2912afd7bbc8bb5f
SHA256 e2c386624695ef1d3594ab3e94cc4e43af0e8373733a3c4447d69969cbbbf143
SHA512 14cb519f4d4acc69cfa9fa87f09350c37ef9540d558dffd9d49ef77878283cdbee8d7328ca25e5f366b37752cd23310f35f1e53d1fc9ae2d2b8bb9246fd6a8a7

memory/1244-8-0x0000000001030000-0x0000000001C96000-memory.dmp

memory/1244-9-0x0000000074740000-0x0000000074E2E000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-10 01:29

Reported

2024-11-10 01:31

Platform

win10v2004-20241007-en

Max time kernel

149s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2024-11-10_57df77d33de042837069fecd75ee1e9c_avoslocker_hijackloader_luca-stealer.exe"

Signatures

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\2024-11-10_57df77d33de042837069fecd75ee1e9c_avoslocker_hijackloader_luca-stealer.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A F:\HMKRN.exe N/A

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\F: C:\Users\Admin\AppData\Local\Temp\2024-11-10_57df77d33de042837069fecd75ee1e9c_avoslocker_hijackloader_luca-stealer.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\2024-11-10_57df77d33de042837069fecd75ee1e9c_avoslocker_hijackloader_luca-stealer.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F:\HMKRN.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A F:\HMKRN.exe N/A
N/A N/A F:\HMKRN.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2024-11-10_57df77d33de042837069fecd75ee1e9c_avoslocker_hijackloader_luca-stealer.exe N/A
Token: SeDebugPrivilege N/A F:\HMKRN.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\2024-11-10_57df77d33de042837069fecd75ee1e9c_avoslocker_hijackloader_luca-stealer.exe

"C:\Users\Admin\AppData\Local\Temp\2024-11-10_57df77d33de042837069fecd75ee1e9c_avoslocker_hijackloader_luca-stealer.exe"

F:\HMKRN.exe

"F:\HMKRN.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 20.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 200.163.202.172.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 66.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 udp

Files

memory/1064-0-0x0000000074C7E000-0x0000000074C7F000-memory.dmp

memory/1064-1-0x0000000000470000-0x00000000010D6000-memory.dmp

memory/1064-2-0x0000000006090000-0x0000000006634000-memory.dmp

F:\HMKRN.exe

MD5 57df77d33de042837069fecd75ee1e9c
SHA1 0215d7e4ef6da1a8e85bae4f2912afd7bbc8bb5f
SHA256 e2c386624695ef1d3594ab3e94cc4e43af0e8373733a3c4447d69969cbbbf143
SHA512 14cb519f4d4acc69cfa9fa87f09350c37ef9540d558dffd9d49ef77878283cdbee8d7328ca25e5f366b37752cd23310f35f1e53d1fc9ae2d2b8bb9246fd6a8a7

memory/904-15-0x0000000074C70000-0x0000000075420000-memory.dmp

memory/904-16-0x0000000006400000-0x0000000006492000-memory.dmp

memory/904-18-0x0000000074C70000-0x0000000075420000-memory.dmp

memory/904-19-0x0000000074C70000-0x0000000075420000-memory.dmp