Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-12-2024 08:28
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-15_40bdb45d10aa017ac2af234f229537f6_hijackloader_luca-stealer_magniber.exe
Resource
win7-20240708-en
General
-
Target
2024-12-15_40bdb45d10aa017ac2af234f229537f6_hijackloader_luca-stealer_magniber.exe
-
Size
2.7MB
-
MD5
40bdb45d10aa017ac2af234f229537f6
-
SHA1
e01594df21fff32b6ca411406a60c18cf7af5156
-
SHA256
2bd98bd1e931fa6378e9a4c14375eb9d4ed6c610d39f4f69db8321acabecaffd
-
SHA512
31b2812c538ad48a4986e3c381cc5fd716bfd194d41b3911cec7d5a3be554ed5b04f8fb6b172c00266e7ccf54f1ac5552e2daf0bb219a6005b8a7403d5f86db4
-
SSDEEP
49152:7wwwwsbmrN1Vy8aboCrE3mQuRJkajhxdv9kj2svzYiBaphM6HZejhbl3uVeOy:PylkgE3mQuRJkmxLkj2mzPy66HZesy
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 2024-12-15_40bdb45d10aa017ac2af234f229537f6_hijackloader_luca-stealer_magniber.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 2024-12-15_40bdb45d10aa017ac2af234f229537f6_hijackloader_luca-stealer_magniber.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 2024-12-15_40bdb45d10aa017ac2af234f229537f6_hijackloader_luca-stealer_magniber.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-12-15_40bdb45d10aa017ac2af234f229537f6_hijackloader_luca-stealer_magniber.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 2024-12-15_40bdb45d10aa017ac2af234f229537f6_hijackloader_luca-stealer_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 2024-12-15_40bdb45d10aa017ac2af234f229537f6_hijackloader_luca-stealer_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 2024-12-15_40bdb45d10aa017ac2af234f229537f6_hijackloader_luca-stealer_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 2024-12-15_40bdb45d10aa017ac2af234f229537f6_hijackloader_luca-stealer_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 2024-12-15_40bdb45d10aa017ac2af234f229537f6_hijackloader_luca-stealer_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 2024-12-15_40bdb45d10aa017ac2af234f229537f6_hijackloader_luca-stealer_magniber.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 2024-12-15_40bdb45d10aa017ac2af234f229537f6_hijackloader_luca-stealer_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 2024-12-15_40bdb45d10aa017ac2af234f229537f6_hijackloader_luca-stealer_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 2024-12-15_40bdb45d10aa017ac2af234f229537f6_hijackloader_luca-stealer_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 2024-12-15_40bdb45d10aa017ac2af234f229537f6_hijackloader_luca-stealer_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 2024-12-15_40bdb45d10aa017ac2af234f229537f6_hijackloader_luca-stealer_magniber.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" 2024-12-15_40bdb45d10aa017ac2af234f229537f6_hijackloader_luca-stealer_magniber.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc 2024-12-15_40bdb45d10aa017ac2af234f229537f6_hijackloader_luca-stealer_magniber.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-12-15_40bdb45d10aa017ac2af234f229537f6_hijackloader_luca-stealer_magniber.exe -
resource yara_rule behavioral2/memory/3640-1-0x0000000000A50000-0x0000000001B0A000-memory.dmp upx behavioral2/memory/3640-12-0x0000000000A50000-0x0000000001B0A000-memory.dmp upx behavioral2/memory/3640-14-0x0000000000A50000-0x0000000001B0A000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\e579b07 2024-12-15_40bdb45d10aa017ac2af234f229537f6_hijackloader_luca-stealer_magniber.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-15_40bdb45d10aa017ac2af234f229537f6_hijackloader_luca-stealer_magniber.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3640 2024-12-15_40bdb45d10aa017ac2af234f229537f6_hijackloader_luca-stealer_magniber.exe 3640 2024-12-15_40bdb45d10aa017ac2af234f229537f6_hijackloader_luca-stealer_magniber.exe 3640 2024-12-15_40bdb45d10aa017ac2af234f229537f6_hijackloader_luca-stealer_magniber.exe 3640 2024-12-15_40bdb45d10aa017ac2af234f229537f6_hijackloader_luca-stealer_magniber.exe -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 2024-12-15_40bdb45d10aa017ac2af234f229537f6_hijackloader_luca-stealer_magniber.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-12-15_40bdb45d10aa017ac2af234f229537f6_hijackloader_luca-stealer_magniber.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-15_40bdb45d10aa017ac2af234f229537f6_hijackloader_luca-stealer_magniber.exe"1⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- System policy modification
PID:3640
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.7MB
MD540bdb45d10aa017ac2af234f229537f6
SHA1e01594df21fff32b6ca411406a60c18cf7af5156
SHA2562bd98bd1e931fa6378e9a4c14375eb9d4ed6c610d39f4f69db8321acabecaffd
SHA51231b2812c538ad48a4986e3c381cc5fd716bfd194d41b3911cec7d5a3be554ed5b04f8fb6b172c00266e7ccf54f1ac5552e2daf0bb219a6005b8a7403d5f86db4