General
-
Target
LakeApi.exe
-
Size
59.6MB
-
Sample
250215-yb36ra1jfq
-
MD5
f899670fdaf78b2d52a059bbd341229a
-
SHA1
f970ccd503e5c816dfffe008dc5ef410deb81051
-
SHA256
09a42cae0e92fca27392a4b2e89a203b3e441cfb4360472808060af4c0940e3c
-
SHA512
e886ba09fe43024f3fcebdb997489019936c395847d3f537b927fa24d736b57fd297b2f550ca0115bd018533a9442f4a7f1a5423db3742b1a4fef44db60f783c
-
SSDEEP
1572864:J0Vjl9KW56f/0nOkiqOv8im2A3+TUE7glhe7fEoI6XhA23jIH:JUedf/0nOknOv8i36+TmLPovXuLH
Behavioral task
behavioral1
Sample
LakeApi.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
LakeApi.exe
Resource
win10v2004-20250211-en
Malware Config
Targets
-
-
Target
LakeApi.exe
-
Size
59.6MB
-
MD5
f899670fdaf78b2d52a059bbd341229a
-
SHA1
f970ccd503e5c816dfffe008dc5ef410deb81051
-
SHA256
09a42cae0e92fca27392a4b2e89a203b3e441cfb4360472808060af4c0940e3c
-
SHA512
e886ba09fe43024f3fcebdb997489019936c395847d3f537b927fa24d736b57fd297b2f550ca0115bd018533a9442f4a7f1a5423db3742b1a4fef44db60f783c
-
SSDEEP
1572864:J0Vjl9KW56f/0nOkiqOv8im2A3+TUE7glhe7fEoI6XhA23jIH:JUedf/0nOknOv8i36+TmLPovXuLH
-
Enumerates VirtualBox DLL files
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
1Virtualization/Sandbox Evasion
1