Static task
static1
Behavioral task
behavioral1
Sample
5c05c6d8f8cfc7679a1892c98cb096d3d74685fe9ac953a8f3e1455739e6d4b5.exe
Resource
win11-20231215-en
General
-
Target
lummac2 5c05c6d8f8cfc7679a1892c98cb096d3d74685fe9ac953a8f3e1455739e6d4b5.zip
-
Size
201KB
-
MD5
c7264988ca6baa990c3a7fba78d5fbfb
-
SHA1
9b4b686443a955e11d4f8bb77233f526aeedfc33
-
SHA256
c7814e3829a8e71c4df397e86f2242c50a8ff20e60d676806f7bcfdeace3638c
-
SHA512
f0cdfc8a270a14b674415df6cdaaf169e014ae134a69dec60cb737ee9f78dee79c96a69f96d489de3639f804494c7d7977c886697d3774cbf49829b6ae9cfebc
-
SSDEEP
3072:vN4cGO4USmlrPV0fh6ibKiNrDs8VszokHe8asNPTOasq0ihrmx+2f0vcHxRwQ0:V8t6rPifQiHsNJtFYUCx+2MvcHxRwQ0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/5c05c6d8f8cfc7679a1892c98cb096d3d74685fe9ac953a8f3e1455739e6d4b5.exe
Files
-
lummac2 5c05c6d8f8cfc7679a1892c98cb096d3d74685fe9ac953a8f3e1455739e6d4b5.zip.zip
Password: infected
-
5c05c6d8f8cfc7679a1892c98cb096d3d74685fe9ac953a8f3e1455739e6d4b5.exe.exe windows:5 windows x86 arch:x86
Password: infected
0f34ff26e4ebc6f121ca1f113f0d7329
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MoveFileExW
SetDefaultCommConfigW
CreateJobObjectW
SetHandleInformation
GetProfileStringW
SetTapeParameters
GetCompressedFileSizeW
CancelDeviceWakeupRequest
GlobalAlloc
GetConsoleAliasExesLengthW
GetFileAttributesW
IsDBCSLeadByte
lstrcatA
ExitThread
SetConsoleTitleA
GetLastError
GetCurrentDirectoryW
GetLongPathNameW
LocalLock
SetFileAttributesA
LoadResource
GetAtomNameA
LoadLibraryA
OpenWaitableTimerW
WritePrivateProfileStringA
SetConsoleDisplayMode
AddAtomW
DeviceIoControl
GetModuleFileNameA
SetConsoleCursorInfo
GetModuleHandleA
QueryMemoryResourceNotification
FreeEnvironmentStringsW
VirtualProtect
SetFileShortNameA
LocalSize
LocalFree
CopyFileExA
SetEnvironmentVariableA
CompareStringW
CompareStringA
WriteConsoleOutputCharacterW
SetFilePointer
SetPriorityClass
GetTempFileNameW
GetEnvironmentVariableW
DisableThreadLibraryCalls
GetFullPathNameW
GetModuleHandleW
Sleep
GetProcAddress
ExitProcess
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
HeapFree
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
WriteFile
GetStdHandle
DeleteCriticalSection
FatalAppExitA
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
VirtualAlloc
HeapReAlloc
MultiByteToWideChar
CloseHandle
CreateFileA
HeapSize
GetLocaleInfoW
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
FlushFileBuffers
ReadFile
SetEndOfFile
GetProcessHeap
GetTimeZoneInformation
RaiseException
user32
GetDesktopWindow
GetMonitorInfoA
advapi32
IsValidSid
GetPrivateObjectSecurity
GetServiceKeyNameW
RegRestoreKeyW
PrivilegedServiceAuditAlarmA
ReadEventLogA
Sections
.text Size: 188KB - Virtual size: 188KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.yov Size: 1024B - Virtual size: 577B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 130KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ