Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 10:04
Static task
static1
Behavioral task
behavioral1
Sample
08b6dd81fd13c91df4330318a08ec33a4c9660a3e44da7ae0e3ea6cadebe2cf0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
08b6dd81fd13c91df4330318a08ec33a4c9660a3e44da7ae0e3ea6cadebe2cf0.exe
Resource
win10v2004-20241007-en
General
-
Target
08b6dd81fd13c91df4330318a08ec33a4c9660a3e44da7ae0e3ea6cadebe2cf0.exe
-
Size
7.2MB
-
MD5
297896830676f90adfba999a29954268
-
SHA1
4b6e74e0b0c9bec0d5955c4b85d6f731ebdde377
-
SHA256
08b6dd81fd13c91df4330318a08ec33a4c9660a3e44da7ae0e3ea6cadebe2cf0
-
SHA512
0fa63e3e766f0a4bb3c311e2be12426674296af5525dafb2a6a5a71eabdf000dcf9958dc41c3e2e73a6698b69f151a8d3d89279973650ce388331c0ce98da8c1
-
SSDEEP
196608:FYgMJpm7T/1EE5cRnHLcfLUwvKqjTY/mvZCVkR12trqbB:FYgMm7T/KEeRHAfwdmYwZCVMv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 08b6dd81fd13c91df4330318a08ec33a4c9660a3e44da7ae0e3ea6cadebe2cf0.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation LMIIgnition.exe -
Executes dropped EXE 2 IoCs
pid Process 1944 LMIIgnition.exe 5004 LMIGuardianSvc.exe -
Loads dropped DLL 1 IoCs
pid Process 5004 LMIGuardianSvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 08b6dd81fd13c91df4330318a08ec33a4c9660a3e44da7ae0e3ea6cadebe2cf0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LMIGuardianSvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LMIIgnition.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2228 PING.EXE 4664 PING.EXE 1196 PING.EXE -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 2228 PING.EXE 4664 PING.EXE 1196 PING.EXE -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeCreateGlobalPrivilege 1944 LMIIgnition.exe Token: SeCreateGlobalPrivilege 1944 LMIIgnition.exe Token: SeCreateGlobalPrivilege 5004 LMIGuardianSvc.exe Token: SeCreateGlobalPrivilege 5004 LMIGuardianSvc.exe Token: SeCreateGlobalPrivilege 1944 LMIIgnition.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1944 LMIIgnition.exe 1944 LMIIgnition.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2988 wrote to memory of 1944 2988 08b6dd81fd13c91df4330318a08ec33a4c9660a3e44da7ae0e3ea6cadebe2cf0.exe 83 PID 2988 wrote to memory of 1944 2988 08b6dd81fd13c91df4330318a08ec33a4c9660a3e44da7ae0e3ea6cadebe2cf0.exe 83 PID 2988 wrote to memory of 1944 2988 08b6dd81fd13c91df4330318a08ec33a4c9660a3e44da7ae0e3ea6cadebe2cf0.exe 83 PID 2988 wrote to memory of 3664 2988 08b6dd81fd13c91df4330318a08ec33a4c9660a3e44da7ae0e3ea6cadebe2cf0.exe 84 PID 2988 wrote to memory of 3664 2988 08b6dd81fd13c91df4330318a08ec33a4c9660a3e44da7ae0e3ea6cadebe2cf0.exe 84 PID 2988 wrote to memory of 3664 2988 08b6dd81fd13c91df4330318a08ec33a4c9660a3e44da7ae0e3ea6cadebe2cf0.exe 84 PID 3664 wrote to memory of 2228 3664 cmd.exe 86 PID 3664 wrote to memory of 2228 3664 cmd.exe 86 PID 3664 wrote to memory of 2228 3664 cmd.exe 86 PID 1944 wrote to memory of 5004 1944 LMIIgnition.exe 87 PID 1944 wrote to memory of 5004 1944 LMIIgnition.exe 87 PID 1944 wrote to memory of 5004 1944 LMIIgnition.exe 87 PID 1944 wrote to memory of 3856 1944 LMIIgnition.exe 90 PID 1944 wrote to memory of 3856 1944 LMIIgnition.exe 90 PID 1944 wrote to memory of 3856 1944 LMIIgnition.exe 90 PID 1944 wrote to memory of 3724 1944 LMIIgnition.exe 92 PID 1944 wrote to memory of 3724 1944 LMIIgnition.exe 92 PID 1944 wrote to memory of 3724 1944 LMIIgnition.exe 92 PID 3856 wrote to memory of 4664 3856 cmd.exe 94 PID 3856 wrote to memory of 4664 3856 cmd.exe 94 PID 3856 wrote to memory of 4664 3856 cmd.exe 94 PID 3724 wrote to memory of 1196 3724 cmd.exe 95 PID 3724 wrote to memory of 1196 3724 cmd.exe 95 PID 3724 wrote to memory of 1196 3724 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\08b6dd81fd13c91df4330318a08ec33a4c9660a3e44da7ae0e3ea6cadebe2cf0.exe"C:\Users\Admin\AppData\Local\Temp\08b6dd81fd13c91df4330318a08ec33a4c9660a3e44da7ae0e3ea6cadebe2cf0.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\IgnD1D7.tmp\LMIIgnition.exe"C:\Users\Admin\AppData\Local\Temp\IgnD1D7.tmp\LMIIgnition.exe" -install2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\IgnD1D7.tmp\LMIGuardianSvc.exe"C:\Users\Admin\AppData\Local\Temp\IgnD1D7.tmp\LMIGuardianSvc.exe" /escort 19443⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5004
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IgnE29F.tmp.cmd" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Windows\SysWOW64\PING.EXEping -n 5 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4664
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IgnE32D.tmp.cmd" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\SysWOW64\PING.EXEping -n 5 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1196
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IgnD1D7.tmp.cmd" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.13⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2228
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3E3E9689537B6B136ECF210088069D55_EF6C9357BB54DDB629FD2D79F1594F95
Filesize727B
MD5f470e4a9cfbefc92da69532e162af1e6
SHA1e754a46bb17f82bc23b1d72222a4090c07c3c6d4
SHA256e0d82949ca6332aabbbc665d1895bfcbb3727eec80970548c8893ff39592b6d7
SHA512780ccbdd95ade9dd41865193d00da7c260df0033699b08ac683730365850548eb871853909228a9acb9453c7767f5b3c18c53b4f5e5417f97a5718f37dfc5681
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
Filesize471B
MD5719182e07998ae9226d45680aa1fe178
SHA18f8b03c110c129cb3a35841ed959de7a7266ffec
SHA2568f1d64c2c4dbb6ca892083e4b4a8bdb4585597e1269c218340c6b12517bb3dbe
SHA5122df474f0ac4d1ef93b14deda32c5476da130bc41f37c0a5cd0c271c990914613c3c788116a4b87d44876695f71e5a131847fdf96d609364c06cb2f5ed6ce76a3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_325DC716E4289E0AE281439314ED4BFA
Filesize727B
MD5b8c9b821e711a6914d4050486cad3db9
SHA176cb62122d0c138c8fdfa3f0f8afad071cfff104
SHA25691f57cf87fbf0d9e2d75515d8a8d2ea2a91d00aada466a22a754ce6706871a5e
SHA5122eb543118d4d292c69b1ceb1098ed954936d71a7387cc94a47f215972f30a04f33800864b6c1fc075e0dc24e7de1f8feaa11f35f047155b3b6c82f4b8cedc8e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
Filesize727B
MD54f2f44acff5c280ecd26b5e7144aff24
SHA1d542052f27cf058cd2bd7d74e75deb8a009bb334
SHA256c9725747ce7f281ac09f3a2287a236369b00e99f310eb837c45b2b4f66b82030
SHA51233d4fcb341e625103b16af3f7b37f4fed5e8d56256980e341fff71356d1a1296192741b96be97de703d8f54af24e3438d0a514edb621ee6e42b1dc4d79089d45
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_56DB209C155B5A05FCBF555DF7E6D1BB
Filesize727B
MD5ff40091b1fd272db403fbf05cd0cd28e
SHA14f20e2f9d55f6831f19fa8dd5e2476529d243295
SHA256a53975e3a270aa9640566a6256e9a4ccfb98c9416d81825eb8559c1443c2b20d
SHA512001813f6c385376a55c6d98e99d904cc30b8d31b3a78e3718882d913228d1986022571f2886e2dfa373adde707864887785c3a92e7051941a2d0551ed0e7a030
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3E3E9689537B6B136ECF210088069D55_EF6C9357BB54DDB629FD2D79F1594F95
Filesize416B
MD524fcfcf9915b13d98134eaa9e3f67a45
SHA1addf8497b5e3ce7fb4d7a06da4000ce630646511
SHA256a0442a18e647cb0589bca12403ca4ac8029803e53691282112112bfed73e1797
SHA51223fa29df710360d6933319b6cbeb70086ee82518903c58d37a2b1fb2288d314bba25b6dbada9289cd4dbf4fdad6fc297045c5e5a4293ed96fb8e65ab48d2cba2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
Filesize400B
MD5930cddb398fc52406b16394a97b722e1
SHA12cc3d05f5cee50fd1b06473709a003924ece1c3c
SHA25616b2a8ce44b064362585ae6cb1c23aad1629210fd6ba5a3c7551b00e6f0c0efa
SHA5129d1f12c446e716799b1a1b059e846271cbc9393eb17e1765705cf7f43888265deb961c07c00daf8b1672939271dc75eaa2ac16d2805c2c4d6a4617410c0c61be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_325DC716E4289E0AE281439314ED4BFA
Filesize408B
MD5043556712cdd8c26b59e026857050b07
SHA19b5419ba32699836fb01b3be7b37de1ab2d6e92d
SHA256e23235871bc3b17576e7d07e13850abf1b05f053040f3ce14ba0c7979041fe62
SHA5125ca9e14efde4aaa7760831ed3d0ea46b9e8a01aae60e3063d379a1403099a94d82d7b34b3c3105b4571d97aa3e87e52241446e858d2bdb571044c0e50beb6282
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
Filesize412B
MD5c8824c312c588f8e8a4e9a138ca1fc46
SHA15676eb5bf332ea51a7e0882574a6906d6c4468d1
SHA2565dd839d766f681f8161512d115f250cc989260ccf07eea824d0c948ffe499f84
SHA51267ae766e30b66178eb3803d86a0a83746b3bcb6239731473dc1ccd7c7c4215023ecbbf3ca69d378145cefd3d7ff8045956dbe17d50c6082a8f5c85da04045d9a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_56DB209C155B5A05FCBF555DF7E6D1BB
Filesize412B
MD51395e427ebc63f3498862cf3b624287a
SHA16e4cc635fd0e91a7735e2bcb000192b146ffd96d
SHA256e8b888354515a75faf550d564a79dd592e0cc15e77aeafd058c66205b90d5d3d
SHA512f586e851a729dc987b93e8c008f4198c208fcfd46c4e9389befa8672b5b9cf0467d92efd6ed94450d4e5cb7cde6e4ba1f5509c9b5a625bd33b24713a0d271bd5
-
Filesize
333B
MD520057ffaa05cd5e60eb52f9e94b2f965
SHA1c1a3281a432e0f0a4a3d8cc921993525cb900ad8
SHA256dd9df82e7c913b1855e400adbcaf1db69328f284ddfccc847ca6cee2510587d0
SHA512555b278af173d5278d5fb64dcb28f052d972852343059d91b42eb13bda105934392eac19090bd58a6d42de9f3f5c1761d3caf1fc7bbcf21da98958d8b30a9028
-
Filesize
1.8MB
MD57a44e3665f03c2e46912b59f1614417e
SHA1e152394adbc1165d3487b5b1ebe92d79b13c68ac
SHA25641b48537b2dbee585bf08b928591b05a116bc6b6780044fe5e35445e0a3c58e7
SHA512978953ffead6638487ffda8306a74112428f58d5c626fd6a8e822900bd578395cb05c8ad94a534d8265665cdacbadb816df27bc55b07c267bc372e6360f816d9
-
Filesize
309KB
MD5bddd0f98e5a371119fa23a3350198f9e
SHA176534fcf26d7f630343343bdbee3c92b1547de15
SHA256e4139d841096cf863ac8244e08f27b5bf7627acc91264c08719fa5e326b557c5
SHA512ff8add02ebd1887b3e419668f5dacc87c00b9b582db63b926523040a8da754d47e561af43e36d88b7aed4ce90ebbf6d7287cef2d7a35e7d920154087030f0a17
-
Filesize
419KB
MD50927b7e7933491dafd1a7b0876bf4578
SHA10bf0aa0f82efc24f927e099691fb3b1847fbe34d
SHA256413dbae208e147a42b9c7ce622caaedde47e85462a6561ec41db7fb1977c972d
SHA51288b6c51f3673a5d8a3bb795977a2aabb263d37cd139e788ceef76ae2505a22dce1b4ba6171120c0f0ea157e0fd42dcce34aa03446208b2f1f7af8b3675a353a4
-
Filesize
7.7MB
MD5cdbdf34821c788c28766e825f1033b5d
SHA1c9b75a25c015769d41df51f14c72c2034fca5a55
SHA2568015e7e3bfb288702b25d831813962b65b9d9fe669ca7becf6cf214084c47358
SHA512487d4b1142c440d45b5fd3eaeb50d078848327924c576f1388e4d5b540aa7b7bf75eff696a405f1e489e2dab64dee6380c9b988028c92351afc529253a685446
-
Filesize
74KB
MD54ac517ece48fa1683df19e86eed922b1
SHA12595110478889d322b2079f042270d97fc4a4283
SHA2564c64ab865ecd6bdde8414983e5520c2195b501379434d00a6ec6e357f62d4104
SHA5127571b0b21d8bd36ca660e4129aa3556a5a996505557515da2a80fcecbe996a15eca277ba381d63df8a0bb594ca3fb1e18c152f95d226d3e6402384ee15ad671d
-
Filesize
8.3MB
MD5ca26ffb2fbe9c7f58d16d7d8aa34a6b4
SHA1301337eb796d98290cb9f438183eebdcb5b57fb3
SHA256c247b359cb9c2710e071dc1f74c354b09438f9c5a8e119abf90cdb7ba62be354
SHA512d06921b5a8fc3636222ae61c87274ebbc7010b3a7944b09e3a1301e16de2ff50e6c6b4f777dd45a8637d47ba37077c8161aa046652d679406664be1234ce5222
-
Filesize
109KB
MD51ecc586392d0c11232b840d16428d28b
SHA16597cc0538e7a1eb9d12a13731d395cd9069413e
SHA256e7ff2415d34a16314724b06d678a53e8d115e93f8ea0e714dc0932f2f102ec49
SHA51221c31e34b4e0ced7a1e6b64b3791e95eae1098d325c7958daed3150de436fee9cf7f42489c323c6d54b5c2876aa6c73fc8b3b15f62613336bd2ed6b8dbfd16b9
-
Filesize
147B
MD5e9eee57322fa0882ab7e1e3421c2c9fc
SHA14440c749c62e0152414cef3e503054442937d01c
SHA25682ffeebd68b19780acaf8548fe3294fcf45ce8fb6208815a0c3ea6d3f3df5f6c
SHA512b2c1e13558810954e6e066e9977f3edab3cbe7e85fd29da9124327d58a126e18fcbca4419a6e7cbbcc2af46253571592c9ac691187e8a0ca009e7c16fbb80ed6
-
Filesize
13KB
MD52e82f902aa3a55d8c87b40f0dbaf3e38
SHA1ef6ba5f71d59ee76685eaf17c6e296848df55711
SHA256a7d3b22dedaf702edc7a06a338a50ca6996b3867d0d2c9dc767972db9963d9c2
SHA5123d1e00e9d8a660e5fb07eb7b229411ab7441bdc54890afe3148b6238b78992a9a65f92ce07ec951b1ccb226679cbfb3f0f7af6ef447fcf2702bc38b492258202
-
Filesize
396KB
MD50a20b7a69963cfcf5892edd327545990
SHA1bc2c8c9552378988d36fe74470d42482489d4e65
SHA256c265df685d31f2e5ba706484e5aa53af3dee519df20cdaf4607e48794d096a72
SHA51277fae39ff0de23be3065b0861bef8537dc1ca8739b3e1bba0a46126e48747da32015c632a8f86f8c9bc6626e929cffa3c7bfcc9fdc3af1e9e5a5ceab3eb46889
-
Filesize
957B
MD5fa447ffcccb74d00bb6c09d13dc3479e
SHA19d4789bf2671876cc108474241e784e93da4b7d2
SHA25649d58e4e54b41e191fb24e8cc04e9d180f70d2b759d7419a675864583540e8d3
SHA5126ddd7ce5ee0deb50dcdb14851ba6904240b86d4584e93dfaa09aa485d5f7f8f5197eda0314fb4661c9cfc9c1dfd9b89a499729142ab7740fc8909e0138129416
-
Filesize
957B
MD5652df9682b9e774bb04e81d40e409573
SHA16c0461e4ef4c3a6d41cff83cf2880f80a3235e0e
SHA2566846c6e1694fc6b67cb42ca1f7a5d1e7301e5c8fa61ea20f5ce0aa4fa2b4b061
SHA512c38da0d6103b0edd512767ef147e70023da5dd4acda0b2654c808b46499333e850cf57d2fb9c7ba234821fdd84e544ff3cc38e1642623dcee359f78cf5424f76