Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 15:47
Static task
static1
Behavioral task
behavioral1
Sample
2024-12-16_eb3d9d71d30c29ccc0c88adb022f1f7a_luca-stealer_magniber_revil.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2024-12-16_eb3d9d71d30c29ccc0c88adb022f1f7a_luca-stealer_magniber_revil.exe
Resource
win10v2004-20241007-en
General
-
Target
2024-12-16_eb3d9d71d30c29ccc0c88adb022f1f7a_luca-stealer_magniber_revil.exe
-
Size
42.8MB
-
MD5
eb3d9d71d30c29ccc0c88adb022f1f7a
-
SHA1
134c269c27416bad3cf7af8a5289616348f66366
-
SHA256
732b4874ac1a1d4326fc1d71d16910fce2835ceb87e76ad4ef2e40b1e948a6cc
-
SHA512
eca3276e8cf3287770eeb3cdbe9e2d6a28dfeb11408ce12e395ab99915dd2deeffe864071e4a2d8e3e7b275ffaea1c4da78e08b4dfb169b88c04d53d7d9a8f7e
-
SSDEEP
786432:HIOK9MrmgNNKBYjUMojDqpPBm1I+yuCUegHOdUXedH0:c6mgNNKqjMfsZECUhRA
Malware Config
Signatures
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Netsupport family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2188 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2024-12-16_eb3d9d71d30c29ccc0c88adb022f1f7a_luca-stealer_magniber_revil.exe -
Executes dropped EXE 1 IoCs
pid Process 2736 DisplayPhotoViewer.exe -
Loads dropped DLL 12 IoCs
pid Process 2736 DisplayPhotoViewer.exe 2736 DisplayPhotoViewer.exe 2736 DisplayPhotoViewer.exe 2736 DisplayPhotoViewer.exe 2736 DisplayPhotoViewer.exe 2736 DisplayPhotoViewer.exe 2736 DisplayPhotoViewer.exe 2736 DisplayPhotoViewer.exe 2736 DisplayPhotoViewer.exe 2736 DisplayPhotoViewer.exe 2736 DisplayPhotoViewer.exe 2736 DisplayPhotoViewer.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NovaSoft Desktop Controller = "C:\\Users\\Admin\\AppData\\Local\\Programs\\Advanced Photo Studio\\DisplayPhotoViewer.exe" DisplayPhotoViewer.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: DisplayPhotoViewer.exe File opened (read-only) \??\S: DisplayPhotoViewer.exe File opened (read-only) \??\W: DisplayPhotoViewer.exe File opened (read-only) \??\N: DisplayPhotoViewer.exe File opened (read-only) \??\Q: DisplayPhotoViewer.exe File opened (read-only) \??\R: DisplayPhotoViewer.exe File opened (read-only) \??\A: DisplayPhotoViewer.exe File opened (read-only) \??\B: DisplayPhotoViewer.exe File opened (read-only) \??\E: DisplayPhotoViewer.exe File opened (read-only) \??\K: DisplayPhotoViewer.exe File opened (read-only) \??\L: DisplayPhotoViewer.exe File opened (read-only) \??\Y: DisplayPhotoViewer.exe File opened (read-only) \??\V: DisplayPhotoViewer.exe File opened (read-only) \??\G: DisplayPhotoViewer.exe File opened (read-only) \??\I: DisplayPhotoViewer.exe File opened (read-only) \??\J: DisplayPhotoViewer.exe File opened (read-only) \??\M: DisplayPhotoViewer.exe File opened (read-only) \??\P: DisplayPhotoViewer.exe File opened (read-only) \??\O: DisplayPhotoViewer.exe File opened (read-only) \??\T: DisplayPhotoViewer.exe File opened (read-only) \??\U: DisplayPhotoViewer.exe File opened (read-only) \??\X: DisplayPhotoViewer.exe File opened (read-only) \??\Z: DisplayPhotoViewer.exe -
Embeds OpenSSL 1 IoCs
Embeds OpenSSL, may be used to circumvent TLS interception.
resource yara_rule behavioral2/files/0x000a000000023b95-36.dat embeds_openssl -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2024-12-16_eb3d9d71d30c29ccc0c88adb022f1f7a_luca-stealer_magniber_revil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DisplayPhotoViewer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Modifies registry class 7 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff DisplayPhotoViewer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ DisplayPhotoViewer.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ DisplayPhotoViewer.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings DisplayPhotoViewer.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell DisplayPhotoViewer.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU DisplayPhotoViewer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots DisplayPhotoViewer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2188 powershell.exe 2188 powershell.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeShutdownPrivilege 2736 DisplayPhotoViewer.exe Token: SeCreatePagefilePrivilege 2736 DisplayPhotoViewer.exe Token: 33 1636 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1636 AUDIODG.EXE Token: SeSecurityPrivilege 2736 DisplayPhotoViewer.exe Token: SeDebugPrivilege 2188 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2736 DisplayPhotoViewer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2736 DisplayPhotoViewer.exe 2736 DisplayPhotoViewer.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2332 wrote to memory of 2736 2332 2024-12-16_eb3d9d71d30c29ccc0c88adb022f1f7a_luca-stealer_magniber_revil.exe 91 PID 2332 wrote to memory of 2736 2332 2024-12-16_eb3d9d71d30c29ccc0c88adb022f1f7a_luca-stealer_magniber_revil.exe 91 PID 2332 wrote to memory of 2736 2332 2024-12-16_eb3d9d71d30c29ccc0c88adb022f1f7a_luca-stealer_magniber_revil.exe 91 PID 2736 wrote to memory of 2044 2736 DisplayPhotoViewer.exe 94 PID 2736 wrote to memory of 2044 2736 DisplayPhotoViewer.exe 94 PID 2736 wrote to memory of 2044 2736 DisplayPhotoViewer.exe 94 PID 2044 wrote to memory of 2188 2044 cmd.exe 96 PID 2044 wrote to memory of 2188 2044 cmd.exe 96 PID 2044 wrote to memory of 2188 2044 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-12-16_eb3d9d71d30c29ccc0c88adb022f1f7a_luca-stealer_magniber_revil.exe"C:\Users\Admin\AppData\Local\Temp\2024-12-16_eb3d9d71d30c29ccc0c88adb022f1f7a_luca-stealer_magniber_revil.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Programs\Advanced Photo Studio\DisplayPhotoViewer.exe"C:\Users\Admin\AppData\Local\Programs\Advanced Photo Studio\DisplayPhotoViewer.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Programs\Advanced Photo Studio\DisplayPhotoViewer.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Programs\Advanced Photo Studio\DisplayPhotoViewer.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2188
-
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2f8 0x2f41⤵
- Suspicious use of AdjustPrivilegeToken
PID:1636
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}1⤵
- System Location Discovery: System Language Discovery
PID:4512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
9KB
MD57050d5ae8acfbe560fa11073fef8185d
SHA15bc38e77ff06785fe0aec5a345c4ccd15752560e
SHA256cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b
SHA512a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b
-
Filesize
6.7MB
MD5f78f5cc0a0b3af7af5485bb47b4809c0
SHA147d2c43f246e204733a09dfaa7e749b0c2860089
SHA25686ae0078776c0411504cf97f4369512013306fcf568cc1dc7a07e180dde08eda
SHA51231947c7d9748c079e6fb0a32e4465b3aff1e10179f8f9dcc0d72e1a0752b205e0c09912b1a853ffb1a9f87e4741b187db93d9540a7dc05844d01225b44b9bdaa
-
Filesize
15.5MB
MD57bcb496eca53ccfac7c6cfb9802c4bb1
SHA1f4f82664848f5c3aca0e7c275f238cf9b9449d26
SHA256979a53f54d540c3b8a3d1d8ff9a138912b351d1e5c48e98273a170668883f594
SHA512ffdf9ec47b467ca94e5b7f27c77dc68aa0500a8406b4726c1432c4ddbedbfd576a7938f2a6d2eeca7af2d49c6c22757e9e9a9df62ab0dee5d271135d3c305af4
-
Filesize
5.7MB
MD533082bf128b1700be41bbc0377520abb
SHA1b8aa3500d08ed31cdb13313311496e6e706967f3
SHA256f5914cf345f20177203e72987eca4a442ddd50934eb6273aa433c177e9640a41
SHA512f513af6cdc480a4e0963976618ffa95763960311e257478fcb06b0210ab12704e53d5bccdf1d9331481acc10b819661c5c36df62d69610aa206678da302a5251
-
Filesize
20.3MB
MD5849c3f4b28eb18b791695d08c407a543
SHA115568664f0914aa6ebc33b3a9430e302f52bddb6
SHA2566b8e41ea8b38426749e7a41bf7bbdaca1cf083b59b0a512c24c242e74f540227
SHA512e19bd0329fc770f8c8db2c3e674bc7699da66870903345998cf451a2ce587f5859e74c7aa22adbc74e0417d81a6b8023a32282babbd11553d61c55c9a6bf372e
-
Filesize
4.9MB
MD5b38c9b2b76254fdf958769db2b9242a8
SHA1b6374308a0338aac7509fc547e07908b98800625
SHA2564dc4b7fcab02e7c53f69e5ec59eeff60be22bc1a7ccc7f0ef9828c9e3090fc91
SHA51240d7bcc8f13a8a5f98843d10a92518e54279ed56ca010dddf5efe1a75c49703bc0bcdfa575e856adc0853cbd03b0ecf1ee0ff245671c0eed555ccc31ab6d2ef9
-
Filesize
2.6MB
MD592ddf7fd13fb43ebd9d0008cc7dfd5a8
SHA1e1990fd53a885806db7375dd27d9761c43d68ec7
SHA2563a38f912bf0f93e266ad7d2ec2a54416b10798f3a6c8eb58e393eb96eb0548fd
SHA512c9103849807b6ff987c74fed9b57d703e5cdd8e2341a42d91d09fc477805c11c73cb60f11dda357e858e535f64db2e24d3377499b301dc8acaa7f00e8f3ffc52
-
Filesize
5.1MB
MD59039c30d9218bbdccd365e3b09134085
SHA1e8ba1634c798fe66ff9ec8d7a04a71d75ce15843
SHA25632684bd13bf3deb98f8604e1f885dbf427c819208b8376de7f60c49ff78686d5
SHA51201ad5186b2eecafec69e95e0974d0fa45fbee8bc80943eb8df55389f9225b178f19112f842e48c776c59b7092ad4679ceb619c204bb0f54c2a8c0a8d62a646ec
-
Filesize
135KB
MD58e58fcc0672a66c827c6f90fa4b58538
SHA13e807dfd27259ae7548692a05af4fe54f8dd32ed
SHA2566e1bf8ea63f9923687709f4e2f0dac7ff558b2ab923e8c8aa147384746e05b1d
SHA5120e9faf457a278ad4c5dd171f65c24f6a027696d931a9a2a2edd4e467da8b8a9e4ab3b1fd2d758f5744bf84bece88c046cda5f7e4204bead14d7c36a46702b768
-
Filesize
316KB
MD5051cdb6ac8e168d178e35489b6da4c74
SHA138c171457d160f8a6f26baa668f5c302f6c29cd1
SHA2566562585009f15155eea9a489e474cebc4dd2a01a26d846fdd1b93fdc24b0c269
SHA512602ab9999f7164a2d1704f712d8a622d69148eefe9a380c30bc8b310eadedf846ce6ae7940317437d5da59404d141dc2d1e0c3f954ca4ac7ae3497e56fcb4e36
-
Filesize
755KB
MD50e37fbfa79d349d672456923ec5fbbe3
SHA14e880fc7625ccf8d9ca799d5b94ce2b1e7597335
SHA2568793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18
SHA5122bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630
-
Filesize
261B
MD5886e4bb84e1ecc4a04ae599d76fcce1d
SHA13f0493bb2088af50bcc8223462db0b207354e946
SHA2565eeb014e3b390e0c85ce72988d422dcd9de1520566b11755c70bdd9bb7376060
SHA512f4db9038a113c4b1e2462b3e0becef2500c9532a79c8187f51d011d690bc68c6d1a99585e43136cb082bd6a232136546db50265f226ff19e67d8430306a8761f
-
Filesize
106KB
MD567c53a770390e8c038060a1921c20da9
SHA149e63af91169c8ce7ef7de3d6a6fb9f8f739fa3a
SHA2562dfdc169dfc27462adc98dde39306de8d0526dcf4577a1a486c2eef447300689
SHA512201e07dbccd83480d6c4d8562e6d0a9e4c52ed12895f0b91d875c2bbcc50b3b1802e11e5e829c948be302bf98ebde7fb2a99476065d1709b3bdbcd5d59a1612d
-
Filesize
14KB
MD53aabcd7c81425b3b9327a2bf643251c6
SHA1ea841199baa7307280fc9e4688ac75e5624f2181
SHA2560cff893b1e7716d09fb74b7a0313b78a09f3f48c586d31fc5f830bd72ce8331f
SHA51297605b07be34948541462000345f1e8f9a9134d139448d4f331cefeeca6dad51c025fcab09d182b86e5a4a8e2f9412b3745ec86b514b0523497c821cb6b8c592
-
Filesize
3.3MB
MD5e7b92529ea10176fe35ba73fa4edef74
SHA1fc5b325d433cde797f6ad0d8b1305d6fb16d4e34
SHA256b6d4ad0231941e0637485ac5833e0fdc75db35289b54e70f3858b70d36d04c80
SHA512fb3a70e87772c1fb386ad8def6c7bdf325b8d525355d4386102649eb2d61f09ce101fce37ccc1f44d5878e604e2e426d96618e836367ab460cae01f627833517
-
Filesize
4.8MB
MD583c72a36afae7542ce660730959c8e2f
SHA1318694cbf96d828d284aace9ea0148ba56d1ccb0
SHA256634d9f12d277e1a2c8e2e20364ae9fe31543f485ddff08cb6bf07a611b5bd054
SHA5129dda43fa2323deaa5dd868a8a8d375b7e8a3b7802735511051a7d0c258949cfda0243bd143bd3d981d9097816be716b27205f9b7aedaee5919156e2b4bdd84d5
-
Filesize
10.6MB
MD5da5b9a31f05338118a3877ec516be04a
SHA11084ab557940f064c6b2cf12129e6376fac6ed27
SHA2560919bb5672c2289161194940b030495c1e4d5cdcfbc1d8fed652b4652525f687
SHA5127ac4ff3aff9b3c50c6c5ca57b5820a831efec9dcdda1c69fb82b1df1e3e0e7b3f5631288774d3ccfdd2a7debdf7b7062da59ab6fe024edb282d55ff3ff05e44b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
16KB
MD580f8258a5975fa3b82f912925026e397
SHA1f88b43d494eefce4ef9fd0644d6efe632d0092d1
SHA25696686e32c6f5b3d9efed29de89a6d1695ecab24a190dec2165e0c3ac302c5999
SHA512fa7813f800a6902d91111a9638d03c47569082f276d46593138550369eedd2f5a02b98e172e808be0a7c54586d6a0fb0a963a12bad2d9311558fb8ac80c52ada