Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
26/02/2025, 22:13
Static task
static1
Behavioral task
behavioral1
Sample
2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe
Resource
win7-20250207-en
General
-
Target
2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe
-
Size
6.4MB
-
MD5
e80cc17b605a28f8c28ff9e0fedc9ea1
-
SHA1
d282c5743221c1998fe096424acd36b7a10ca282
-
SHA256
b6faf054e1af085bf4aac6543219cc25d881be3595913602de0dd831947a5673
-
SHA512
0377488d6eec03bafdf8b4ef7c7c735ede9969363b83ce4bce275988e7a33744a582136d7043356665ab0ab1cede1310778db37f9437b4f2fc49c493ff9e44b4
-
SSDEEP
196608:4Nsg4AMgA2Nsg4AMgAANsg4AMgA8FIF0wuC:4Gg4aBGg4anGg4aDC
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4456 powershell.exe 1112 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4184 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 1112 powershell.exe 1112 powershell.exe 4456 powershell.exe 4456 powershell.exe 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 1112 powershell.exe 4456 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe Token: SeDebugPrivilege 1112 powershell.exe Token: SeDebugPrivilege 4456 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 5404 wrote to memory of 1112 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 102 PID 5404 wrote to memory of 1112 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 102 PID 5404 wrote to memory of 1112 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 102 PID 5404 wrote to memory of 4456 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 104 PID 5404 wrote to memory of 4456 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 104 PID 5404 wrote to memory of 4456 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 104 PID 5404 wrote to memory of 4184 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 106 PID 5404 wrote to memory of 4184 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 106 PID 5404 wrote to memory of 4184 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 106 PID 5404 wrote to memory of 4612 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 109 PID 5404 wrote to memory of 4612 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 109 PID 5404 wrote to memory of 4612 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 109 PID 5404 wrote to memory of 5212 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 110 PID 5404 wrote to memory of 5212 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 110 PID 5404 wrote to memory of 5212 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 110 PID 5404 wrote to memory of 5660 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 111 PID 5404 wrote to memory of 5660 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 111 PID 5404 wrote to memory of 5660 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 111 PID 5404 wrote to memory of 5784 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 112 PID 5404 wrote to memory of 5784 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 112 PID 5404 wrote to memory of 5784 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 112 PID 5404 wrote to memory of 3404 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 113 PID 5404 wrote to memory of 3404 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 113 PID 5404 wrote to memory of 3404 5404 2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5404 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1112
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\sXLAWJKdeDZVj.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4456
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sXLAWJKdeDZVj" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE05.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4184
-
-
C:\Users\Admin\AppData\Local\Temp\2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe"2⤵PID:4612
-
-
C:\Users\Admin\AppData\Local\Temp\2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe"2⤵PID:5212
-
-
C:\Users\Admin\AppData\Local\Temp\2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe"2⤵PID:5660
-
-
C:\Users\Admin\AppData\Local\Temp\2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe"2⤵PID:5784
-
-
C:\Users\Admin\AppData\Local\Temp\2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-02-26_e80cc17b605a28f8c28ff9e0fedc9ea1_avoslocker_hijackloader_luca-stealer.exe"2⤵PID:3404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD58e08ebacf8a6bb7e983250e25dda3654
SHA1f932ecdbdba6be5ca564999569f8756083ee3da3
SHA2560611ca859e9958e49696fe346a7b9a468e748bfe25b57bfb4c512244b81c71ef
SHA512e195f0601dcf9752a4728f6e5372ee30e273330b01b2795266087ea55a5830072457ecac4e1fc1a2bb506d05dc516a4ebbaa8bf33a6a7ae54754f4cb9563b98f
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD58dc5996e78ef781fe7fcafed7302e900
SHA1c0b9d8227c8179a528a8bccd200f8ddd2fed0deb
SHA25619ce26f2db2ed0bd5ce2c7712fe627b33d15f7a59b17fb88885afe42a6e0ce5d
SHA51259419ba370ad7c73039d7439cb482a754e69b125030f4d90fc73dce5fa1d23436ab1369e1f784f30d87beb8ab16080a7a98205439c1326de02d790b699a9dccc