Analysis
-
max time kernel
143s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 15:17
Static task
static1
Behavioral task
behavioral1
Sample
0367292a18cefaa80dddab05c1a59987.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0367292a18cefaa80dddab05c1a59987.exe
Resource
win10v2004-20231215-en
General
-
Target
0367292a18cefaa80dddab05c1a59987.exe
-
Size
67KB
-
MD5
0367292a18cefaa80dddab05c1a59987
-
SHA1
76dc505f228f44eb95c73ab012bf5b8202ab72d5
-
SHA256
cff5bfbcc6fde58110e968d0476d64135459e69691856bbd3c58d1c45fc4441d
-
SHA512
61186ae6090eb81b9c6b5f4eb29abb614a95c2c8e39a9d8a585a426fb03ee8b3efe87c070d5ef9b64ebca7d9502d8dbf19666df7b73ae21270706ce2f56ed901
-
SSDEEP
1536:SIdHmGuOt0QGkPxv1NCl84mD9m8rOyawDx6b3YcDl:SSHYe0QLxNjrg0DwLYm
Malware Config
Signatures
-
Detect Lumma Stealer payload V4 2 IoCs
resource yara_rule behavioral1/memory/1040-1-0x0000000000400000-0x000000000045E000-memory.dmp family_lumma_v4 behavioral1/memory/1040-13-0x0000000000400000-0x000000000045E000-memory.dmp family_lumma_v4 -
Executes dropped EXE 1 IoCs
pid Process 1228 devldr32.exe -
Loads dropped DLL 6 IoCs
pid Process 1040 0367292a18cefaa80dddab05c1a59987.exe 1040 0367292a18cefaa80dddab05c1a59987.exe 2212 WerFault.exe 2212 WerFault.exe 2212 WerFault.exe 2212 WerFault.exe -
resource yara_rule behavioral1/memory/1040-1-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral1/memory/1228-12-0x0000000000420000-0x000000000047E000-memory.dmp upx behavioral1/memory/1040-13-0x0000000000400000-0x000000000045E000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\devldr32.exe 0367292a18cefaa80dddab05c1a59987.exe File opened for modification C:\Windows\SysWOW64\devldr32.exe 0367292a18cefaa80dddab05c1a59987.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2212 1228 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1040 wrote to memory of 1228 1040 0367292a18cefaa80dddab05c1a59987.exe 28 PID 1040 wrote to memory of 1228 1040 0367292a18cefaa80dddab05c1a59987.exe 28 PID 1040 wrote to memory of 1228 1040 0367292a18cefaa80dddab05c1a59987.exe 28 PID 1040 wrote to memory of 1228 1040 0367292a18cefaa80dddab05c1a59987.exe 28 PID 1228 wrote to memory of 2212 1228 devldr32.exe 29 PID 1228 wrote to memory of 2212 1228 devldr32.exe 29 PID 1228 wrote to memory of 2212 1228 devldr32.exe 29 PID 1228 wrote to memory of 2212 1228 devldr32.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0367292a18cefaa80dddab05c1a59987.exe"C:\Users\Admin\AppData\Local\Temp\0367292a18cefaa80dddab05c1a59987.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\devldr32.exeC:\Windows\system32\devldr32.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1228 -s 1603⤵
- Loads dropped DLL
- Program crash
PID:2212
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD50367292a18cefaa80dddab05c1a59987
SHA176dc505f228f44eb95c73ab012bf5b8202ab72d5
SHA256cff5bfbcc6fde58110e968d0476d64135459e69691856bbd3c58d1c45fc4441d
SHA51261186ae6090eb81b9c6b5f4eb29abb614a95c2c8e39a9d8a585a426fb03ee8b3efe87c070d5ef9b64ebca7d9502d8dbf19666df7b73ae21270706ce2f56ed901