Analysis
-
max time kernel
108s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16/05/2023, 11:49
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
10 signatures
150 seconds
General
-
Target
file.exe
-
Size
2.9MB
-
MD5
ad60c039352b7cc14e2d9e20658b4f55
-
SHA1
27f06407aec208e505a375a5240790b1b0209b96
-
SHA256
e7e6d5bbce9634227bfd03d13847dfe1a574663eeeb238307afb6cf71a105afc
-
SHA512
883fd62d65ead14aaa50398cedb96b9fdcf727b3de5c8fb73c1997568fc10fe5a4df52df2d655504aa95d5633fa7cf8d23f1a392c16f73f2c3a92faf04c2c30a
-
SSDEEP
49152:nRRivn9urgLOOYRFjyohx6/sAYowbyrlzNToB+5qrohaF+OaElRsSMlN:RAu8LHkFjy8oUAYYViB+57aFboD
Malware Config
Extracted
Family
lumma
C2
195.123.227.138
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe -
resource yara_rule behavioral2/memory/5072-138-0x00000000007D0000-0x000000000105A000-memory.dmp themida behavioral2/memory/5072-146-0x00000000007D0000-0x000000000105A000-memory.dmp themida -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA file.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 5072 file.exe 4180 InstallUtil.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5072 set thread context of 4180 5072 file.exe 82 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLoadDriverPrivilege 4180 InstallUtil.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5072 wrote to memory of 4180 5072 file.exe 82 PID 5072 wrote to memory of 4180 5072 file.exe 82 PID 5072 wrote to memory of 4180 5072 file.exe 82 PID 5072 wrote to memory of 4180 5072 file.exe 82 PID 5072 wrote to memory of 4180 5072 file.exe 82 PID 5072 wrote to memory of 4180 5072 file.exe 82 PID 5072 wrote to memory of 4180 5072 file.exe 82 PID 5072 wrote to memory of 4180 5072 file.exe 82 PID 5072 wrote to memory of 4180 5072 file.exe 82 PID 5072 wrote to memory of 4180 5072 file.exe 82 PID 5072 wrote to memory of 4180 5072 file.exe 82 PID 5072 wrote to memory of 4180 5072 file.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:4180
-