Analysis
-
max time kernel
40s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
23-11-2024 20:19
General
-
Target
LithiumLite.exe
-
Size
3.7MB
-
MD5
2d1c1c911130b38a59889a43a3aa84cd
-
SHA1
7bd4c2cae027b038827d03200ded37dfacf4b9d6
-
SHA256
67abc7abb10191e8cbb1448136764f631919540f2511dcc283e4db5fcfd31ce8
-
SHA512
091abaa7dc9dddb5374d0cc5dd98625e067e5664717c31f94e8c3829253cdafac6df8b72299015546480a088b3500daf3b27ab67a76e1ea7831a6fcec3865318
-
SSDEEP
98304:dp4L/P8E9sTagw10xY/mMw/uqRPdB69AgXAGt:AL/UE9yaHnw/b3IagXAI
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
LithiumLite.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ LithiumLite.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
LithiumLite.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion LithiumLite.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion LithiumLite.exe -
Processes:
resource yara_rule behavioral1/memory/3152-0-0x00007FF6E1D60000-0x00007FF6E271F000-memory.dmp themida behavioral1/memory/3152-3-0x00007FF6E1D60000-0x00007FF6E271F000-memory.dmp themida behavioral1/memory/3152-4-0x00007FF6E1D60000-0x00007FF6E271F000-memory.dmp themida behavioral1/memory/3152-2-0x00007FF6E1D60000-0x00007FF6E271F000-memory.dmp themida behavioral1/memory/3152-6-0x00007FF6E1D60000-0x00007FF6E271F000-memory.dmp themida behavioral1/memory/3152-5-0x00007FF6E1D60000-0x00007FF6E271F000-memory.dmp themida behavioral1/memory/3152-7-0x00007FF6E1D60000-0x00007FF6E271F000-memory.dmp themida -
Processes:
LithiumLite.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA LithiumLite.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
LithiumLite.exepid process 3152 LithiumLite.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\LithiumLite.exe"C:\Users\Admin\AppData\Local\Temp\LithiumLite.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3152