Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/01/2025, 01:17
Behavioral task
behavioral1
Sample
2025-01-25_27b2027f92ca66969c3f2449010aba5c_avoslocker_cobalt-strike_luca-stealer.exe
Resource
win7-20240903-en
General
-
Target
2025-01-25_27b2027f92ca66969c3f2449010aba5c_avoslocker_cobalt-strike_luca-stealer.exe
-
Size
270KB
-
MD5
27b2027f92ca66969c3f2449010aba5c
-
SHA1
f4fc8e43ad5d15c3781c7b0812a3663d55c98643
-
SHA256
eca457c7e9258b7526c10dda70afb96f7af73718c19c4ede894cc40e56af77fa
-
SHA512
98c6b55170cedc5b1d27cc8775b1d2acd023d20956767bfe3b96cbe88ceb56abe042d575b66539fe7fb11aa43cf5978a3ce66b60534bb638468fbff4692a4689
-
SSDEEP
6144:tDOnyhORl/hfUStnsjngPq+Ar32coTinSReWYfpuyt4pxdmqxFB:tDIyhORl/pUSNsjngPMr3JoTimYfpuyE
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 332 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-25_27b2027f92ca66969c3f2449010aba5c_avoslocker_cobalt-strike_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2025-01-25_27b2027f92ca66969c3f2449010aba5c_avoslocker_cobalt-strike_luca-stealer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2025-01-25_27b2027f92ca66969c3f2449010aba5c_avoslocker_cobalt-strike_luca-stealer.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2176 timeout.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2020 wrote to memory of 332 2020 2025-01-25_27b2027f92ca66969c3f2449010aba5c_avoslocker_cobalt-strike_luca-stealer.exe 30 PID 2020 wrote to memory of 332 2020 2025-01-25_27b2027f92ca66969c3f2449010aba5c_avoslocker_cobalt-strike_luca-stealer.exe 30 PID 2020 wrote to memory of 332 2020 2025-01-25_27b2027f92ca66969c3f2449010aba5c_avoslocker_cobalt-strike_luca-stealer.exe 30 PID 2020 wrote to memory of 332 2020 2025-01-25_27b2027f92ca66969c3f2449010aba5c_avoslocker_cobalt-strike_luca-stealer.exe 30 PID 332 wrote to memory of 2176 332 cmd.exe 32 PID 332 wrote to memory of 2176 332 cmd.exe 32 PID 332 wrote to memory of 2176 332 cmd.exe 32 PID 332 wrote to memory of 2176 332 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-25_27b2027f92ca66969c3f2449010aba5c_avoslocker_cobalt-strike_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-25_27b2027f92ca66969c3f2449010aba5c_avoslocker_cobalt-strike_luca-stealer.exe"1⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\buBGjbgD & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\2025-01-25_27b2027f92ca66969c3f2449010aba5c_avoslocker_cobalt-strike_luca-stealer.exe"2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Windows\SysWOW64\timeout.exetimeout 43⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2176
-
-