Analysis
-
max time kernel
147s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 01:56
Static task
static1
Behavioral task
behavioral1
Sample
0ad3746fa6d0a05ca727f10562543167.exe
Resource
win7-20231215-en
General
-
Target
0ad3746fa6d0a05ca727f10562543167.exe
-
Size
211KB
-
MD5
0ad3746fa6d0a05ca727f10562543167
-
SHA1
cd268e5498a014649b0391c91896a482685d3855
-
SHA256
96eaf33c7af5b34c5c273533d36f256e4ff071f2853d6de5b68856031551d67a
-
SHA512
bd8198769b0d999c07c9eb37bd7e2047866dd6ec9b69299515d27a1c45c59f73ce1fb32b02808ac3cf990b66b4c2597d74a8609537eeef5d7f7532eb3248b8c7
-
SSDEEP
3072:Z9vT46HqojWslVqRtHn02RICB6WBU+ea60Z2cqIlg0negQeV1OmTC1fcX:T46rWgqPH02RICB6IUa60ZK6hQECpy
Malware Config
Signatures
-
Detect Lumma Stealer payload V4 13 IoCs
resource yara_rule behavioral1/memory/2028-19-0x0000000000400000-0x00000000004DE000-memory.dmp family_lumma_v4 behavioral1/memory/2748-26-0x0000000000400000-0x00000000004DE000-memory.dmp family_lumma_v4 behavioral1/memory/2228-38-0x0000000000400000-0x00000000004DE000-memory.dmp family_lumma_v4 behavioral1/memory/2228-44-0x0000000002CF0000-0x0000000002DCE000-memory.dmp family_lumma_v4 behavioral1/memory/240-52-0x0000000000400000-0x00000000004DE000-memory.dmp family_lumma_v4 behavioral1/memory/2724-65-0x0000000000400000-0x00000000004DE000-memory.dmp family_lumma_v4 behavioral1/memory/1900-79-0x0000000000400000-0x00000000004DE000-memory.dmp family_lumma_v4 behavioral1/memory/1900-83-0x0000000003110000-0x00000000031EE000-memory.dmp family_lumma_v4 behavioral1/memory/1100-92-0x0000000000400000-0x00000000004DE000-memory.dmp family_lumma_v4 behavioral1/memory/1100-95-0x0000000003150000-0x000000000322E000-memory.dmp family_lumma_v4 behavioral1/memory/2436-106-0x0000000000400000-0x00000000004DE000-memory.dmp family_lumma_v4 behavioral1/memory/1568-121-0x0000000000400000-0x00000000004DE000-memory.dmp family_lumma_v4 behavioral1/memory/1568-125-0x0000000003090000-0x000000000316E000-memory.dmp family_lumma_v4 -
Executes dropped EXE 9 IoCs
pid Process 2748 jusched.exe 2228 jusched.exe 240 jusched.exe 2724 jusched.exe 1900 jusched.exe 1100 jusched.exe 2436 jusched.exe 1568 jusched.exe 1676 jusched.exe -
Loads dropped DLL 18 IoCs
pid Process 2028 0ad3746fa6d0a05ca727f10562543167.exe 2028 0ad3746fa6d0a05ca727f10562543167.exe 2748 jusched.exe 2748 jusched.exe 2228 jusched.exe 2228 jusched.exe 240 jusched.exe 240 jusched.exe 2724 jusched.exe 2724 jusched.exe 1900 jusched.exe 1900 jusched.exe 1100 jusched.exe 1100 jusched.exe 2436 jusched.exe 2436 jusched.exe 1568 jusched.exe 1568 jusched.exe -
Drops file in System32 directory 29 IoCs
description ioc Process File created C:\Windows\SysWOW64\.bat jusched.exe File opened for modification C:\Windows\SysWOW64\jusched.exe 0ad3746fa6d0a05ca727f10562543167.exe File opened for modification C:\Windows\SysWOW64\jusched.exe jusched.exe File created C:\Windows\SysWOW64\.bat jusched.exe File created C:\Windows\SysWOW64\jusched.exe jusched.exe File created C:\Windows\SysWOW64\.bat jusched.exe File created C:\Windows\SysWOW64\jusched.exe jusched.exe File created C:\Windows\SysWOW64\jusched.exe jusched.exe File created C:\Windows\SysWOW64\jusched.exe jusched.exe File opened for modification C:\Windows\SysWOW64\jusched.exe jusched.exe File opened for modification C:\Windows\SysWOW64\jusched.exe jusched.exe File created C:\Windows\SysWOW64\.bat jusched.exe File opened for modification C:\Windows\SysWOW64\jusched.exe jusched.exe File created C:\Windows\SysWOW64\jusched.exe jusched.exe File created C:\Windows\SysWOW64\.bat jusched.exe File created C:\Windows\SysWOW64\.bat jusched.exe File opened for modification C:\Windows\SysWOW64\jusched.exe jusched.exe File created C:\Windows\SysWOW64\jusched.exe 0ad3746fa6d0a05ca727f10562543167.exe File created C:\Windows\SysWOW64\jusched.exe jusched.exe File opened for modification C:\Windows\SysWOW64\jusched.exe jusched.exe File opened for modification C:\Windows\SysWOW64\jusched.exe jusched.exe File created C:\Windows\SysWOW64\.bat jusched.exe File opened for modification C:\Windows\SysWOW64\jusched.exe jusched.exe File created C:\Windows\SysWOW64\jusched.exe jusched.exe File created C:\Windows\SysWOW64\jusched.exe jusched.exe File created C:\Windows\SysWOW64\jusched.exe jusched.exe File created C:\Windows\SysWOW64\.bat jusched.exe File opened for modification C:\Windows\SysWOW64\jusched.exe jusched.exe File created C:\Windows\SysWOW64\.bat jusched.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2028 wrote to memory of 2748 2028 0ad3746fa6d0a05ca727f10562543167.exe 28 PID 2028 wrote to memory of 2748 2028 0ad3746fa6d0a05ca727f10562543167.exe 28 PID 2028 wrote to memory of 2748 2028 0ad3746fa6d0a05ca727f10562543167.exe 28 PID 2028 wrote to memory of 2748 2028 0ad3746fa6d0a05ca727f10562543167.exe 28 PID 2748 wrote to memory of 2228 2748 jusched.exe 29 PID 2748 wrote to memory of 2228 2748 jusched.exe 29 PID 2748 wrote to memory of 2228 2748 jusched.exe 29 PID 2748 wrote to memory of 2228 2748 jusched.exe 29 PID 2228 wrote to memory of 240 2228 jusched.exe 32 PID 2228 wrote to memory of 240 2228 jusched.exe 32 PID 2228 wrote to memory of 240 2228 jusched.exe 32 PID 2228 wrote to memory of 240 2228 jusched.exe 32 PID 240 wrote to memory of 2724 240 jusched.exe 33 PID 240 wrote to memory of 2724 240 jusched.exe 33 PID 240 wrote to memory of 2724 240 jusched.exe 33 PID 240 wrote to memory of 2724 240 jusched.exe 33 PID 2724 wrote to memory of 1900 2724 jusched.exe 34 PID 2724 wrote to memory of 1900 2724 jusched.exe 34 PID 2724 wrote to memory of 1900 2724 jusched.exe 34 PID 2724 wrote to memory of 1900 2724 jusched.exe 34 PID 1900 wrote to memory of 1100 1900 jusched.exe 35 PID 1900 wrote to memory of 1100 1900 jusched.exe 35 PID 1900 wrote to memory of 1100 1900 jusched.exe 35 PID 1900 wrote to memory of 1100 1900 jusched.exe 35 PID 1100 wrote to memory of 2436 1100 jusched.exe 36 PID 1100 wrote to memory of 2436 1100 jusched.exe 36 PID 1100 wrote to memory of 2436 1100 jusched.exe 36 PID 1100 wrote to memory of 2436 1100 jusched.exe 36 PID 2436 wrote to memory of 1568 2436 jusched.exe 37 PID 2436 wrote to memory of 1568 2436 jusched.exe 37 PID 2436 wrote to memory of 1568 2436 jusched.exe 37 PID 2436 wrote to memory of 1568 2436 jusched.exe 37 PID 1568 wrote to memory of 1676 1568 jusched.exe 38 PID 1568 wrote to memory of 1676 1568 jusched.exe 38 PID 1568 wrote to memory of 1676 1568 jusched.exe 38 PID 1568 wrote to memory of 1676 1568 jusched.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ad3746fa6d0a05ca727f10562543167.exe"C:\Users\Admin\AppData\Local\Temp\0ad3746fa6d0a05ca727f10562543167.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\jusched.exeC:\Windows\system32\jusched.exe 628 "C:\Users\Admin\AppData\Local\Temp\0ad3746fa6d0a05ca727f10562543167.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\jusched.exeC:\Windows\system32\jusched.exe 620 "C:\Windows\SysWOW64\jusched.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\jusched.exeC:\Windows\system32\jusched.exe 624 "C:\Windows\SysWOW64\jusched.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:240 -
C:\Windows\SysWOW64\jusched.exeC:\Windows\system32\jusched.exe 636 "C:\Windows\SysWOW64\jusched.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\jusched.exeC:\Windows\system32\jusched.exe 632 "C:\Windows\SysWOW64\jusched.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\jusched.exeC:\Windows\system32\jusched.exe 644 "C:\Windows\SysWOW64\jusched.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\jusched.exeC:\Windows\system32\jusched.exe 640 "C:\Windows\SysWOW64\jusched.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\jusched.exeC:\Windows\system32\jusched.exe 648 "C:\Windows\SysWOW64\jusched.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\SysWOW64\jusched.exeC:\Windows\system32\jusched.exe 652 "C:\Windows\SysWOW64\jusched.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1676
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD50ad3746fa6d0a05ca727f10562543167
SHA1cd268e5498a014649b0391c91896a482685d3855
SHA25696eaf33c7af5b34c5c273533d36f256e4ff071f2853d6de5b68856031551d67a
SHA512bd8198769b0d999c07c9eb37bd7e2047866dd6ec9b69299515d27a1c45c59f73ce1fb32b02808ac3cf990b66b4c2597d74a8609537eeef5d7f7532eb3248b8c7