Analysis
-
max time kernel
34s -
max time network
36s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
18-12-2024 17:49
Behavioral task
behavioral1
Sample
KINGDOM/CE_punch.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral2
Sample
KINGDOM/NewX.vmp.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral3
Sample
KINGDOM/lua53-64.dll
Resource
win10ltsc2021-20241211-en
General
-
Target
KINGDOM/NewX.vmp.exe
-
Size
10.1MB
-
MD5
410912bf0fb6f35648644fe15f0db3fd
-
SHA1
6e2d57b868372e22b318e79a2bd6da4c2902e75e
-
SHA256
e8220c82de5497eecd9b6a92210d6dbac2e1f0b17dc18ef81cbdafbd61a376da
-
SHA512
9b3966a2300682f84d3fe41958943c3dbf2b73a8209ee749338a76bf60f240367fa185cb5c80570dca2d539c2e2c7546a462e2b72c3be2887e16253895841c1c
-
SSDEEP
196608:lfVjfV9N6JdZIVg48vXBzQN8MEJoUTFBYSg8t/9bG06GiOF:/jfV9sNIq48vXBcNQJoIFSSg8L6XnOF
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/1092-8-0x0000000000400000-0x00000000020DA000-memory.dmp vmprotect behavioral2/memory/1092-22-0x0000000000400000-0x00000000020DA000-memory.dmp vmprotect -
Drops file in System32 directory 44 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM32\Wldp.dll NewX.vmp.exe File opened for modification C:\Windows\System32\gdi32full.dll NewX.vmp.exe File opened for modification C:\Windows\System32\imm32.dll NewX.vmp.exe File opened for modification C:\Windows\SYSTEM32\GLU32.dll NewX.vmp.exe File opened for modification C:\Windows\System32\clbcatq.dll NewX.vmp.exe File opened for modification C:\Windows\System32\win32u.dll NewX.vmp.exe File opened for modification C:\Windows\System32\advapi32.dll NewX.vmp.exe File opened for modification C:\Windows\System32\msvcrt.dll NewX.vmp.exe File opened for modification C:\Windows\System32\imagehlp.dll NewX.vmp.exe File opened for modification C:\Windows\System32\KERNEL32.DLL NewX.vmp.exe File opened for modification C:\Windows\System32\KERNELBASE.dll NewX.vmp.exe File opened for modification C:\Windows\System32\RPCRT4.dll NewX.vmp.exe File opened for modification C:\Windows\System32\user32.dll NewX.vmp.exe File opened for modification C:\Windows\SYSTEM32\uxtheme.dll NewX.vmp.exe File opened for modification C:\Windows\system32\explorerframe.dll NewX.vmp.exe File opened for modification C:\Windows\System32\comdlg32.dll NewX.vmp.exe File opened for modification C:\Windows\System32\psapi.dll NewX.vmp.exe File opened for modification C:\Windows\SYSTEM32\hhctrl.ocx NewX.vmp.exe File opened for modification C:\Windows\System32\ucrtbase.dll NewX.vmp.exe File opened for modification C:\Windows\System32\shlwapi.dll NewX.vmp.exe File opened for modification C:\Windows\System32\bcryptPrimitives.dll NewX.vmp.exe File opened for modification C:\Windows\System32\MSCTF.dll NewX.vmp.exe File opened for modification C:\Windows\System32\shcore.dll NewX.vmp.exe File opened for modification C:\Windows\SYSTEM32\opengl32.dll NewX.vmp.exe File opened for modification C:\Windows\SYSTEM32\profapi.dll NewX.vmp.exe File opened for modification C:\Windows\SYSTEM32\PROPSYS.dll NewX.vmp.exe File opened for modification C:\Windows\SYSTEM32\kernel.appcore.dll NewX.vmp.exe File opened for modification C:\Windows\System32\sechost.dll NewX.vmp.exe File opened for modification C:\Windows\System32\shell32.dll NewX.vmp.exe File opened for modification C:\Windows\System32\ws2_32.dll NewX.vmp.exe File opened for modification C:\Windows\SYSTEM32\wininet.dll NewX.vmp.exe File opened for modification C:\Windows\System32\ole32.dll NewX.vmp.exe File opened for modification C:\Windows\SYSTEM32\msimg32.dll NewX.vmp.exe File opened for modification C:\Windows\SYSTEM32\ntdll.dll NewX.vmp.exe File opened for modification C:\Windows\System32\oleaut32.dll NewX.vmp.exe File opened for modification C:\Windows\System32\msvcp_win.dll NewX.vmp.exe File opened for modification C:\Windows\System32\bcrypt.dll NewX.vmp.exe File opened for modification C:\Windows\SYSTEM32\WTSAPI32.dll NewX.vmp.exe File opened for modification C:\Windows\system32\shfolder.dll NewX.vmp.exe File opened for modification C:\Windows\SYSTEM32\windows.storage.dll NewX.vmp.exe File opened for modification C:\Windows\System32\combase.dll NewX.vmp.exe File opened for modification C:\Windows\System32\GDI32.dll NewX.vmp.exe File opened for modification C:\Windows\SYSTEM32\version.dll NewX.vmp.exe File opened for modification C:\Windows\SYSTEM32\wsock32.dll NewX.vmp.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\WinSxS\amd64_microsoft.windows.common-controls_6595b64144ccf1df_6.0.19041.4355_none_60b8b9eb71f62e16\comctl32.dll NewX.vmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1092 NewX.vmp.exe 1092 NewX.vmp.exe 1092 NewX.vmp.exe 1092 NewX.vmp.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 1092 NewX.vmp.exe Token: SeTcbPrivilege 1092 NewX.vmp.exe Token: SeTcbPrivilege 1092 NewX.vmp.exe Token: SeLoadDriverPrivilege 1092 NewX.vmp.exe Token: SeCreateGlobalPrivilege 1092 NewX.vmp.exe Token: SeLockMemoryPrivilege 1092 NewX.vmp.exe Token: 33 1092 NewX.vmp.exe Token: SeSecurityPrivilege 1092 NewX.vmp.exe Token: SeTakeOwnershipPrivilege 1092 NewX.vmp.exe Token: SeManageVolumePrivilege 1092 NewX.vmp.exe Token: SeBackupPrivilege 1092 NewX.vmp.exe Token: SeCreatePagefilePrivilege 1092 NewX.vmp.exe Token: SeShutdownPrivilege 1092 NewX.vmp.exe Token: SeRestorePrivilege 1092 NewX.vmp.exe Token: 33 1092 NewX.vmp.exe Token: SeIncBasePriorityPrivilege 1092 NewX.vmp.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1092 NewX.vmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\KINGDOM\NewX.vmp.exe"C:\Users\Admin\AppData\Local\Temp\KINGDOM\NewX.vmp.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1092