Analysis
-
max time kernel
5s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 03:38
Behavioral task
behavioral1
Sample
26a331b3df88e5e92a08b83e1e5693d0.exe
Resource
win7-20231215-en
5 signatures
150 seconds
General
-
Target
26a331b3df88e5e92a08b83e1e5693d0.exe
-
Size
1.1MB
-
MD5
26a331b3df88e5e92a08b83e1e5693d0
-
SHA1
7f7f45d5b6f2cb6cb52e195522088e4a38ae8da1
-
SHA256
f1d730dfb192205d1a384b18c79f18879e382ec01435df84bc5356fc200ff27e
-
SHA512
1440e1678a882b1f467d4589373d4266099ad266d7cf9708fddd498f6d5cc7bd9bbebf150af8e600951bd89ac5094a73c0ebcf75c175b33d3e17ed022a95871e
-
SSDEEP
24576:jXay62HO2tEdLL+kMtK9852zGbyy6hHOXn4:jNndA+TJKaxmuo
Malware Config
Signatures
-
Detect Lumma Stealer payload V4 19 IoCs
resource yara_rule behavioral2/memory/4472-11-0x0000000000400000-0x000000000073C000-memory.dmp family_lumma_v4 behavioral2/memory/4472-32-0x0000000000400000-0x000000000073C000-memory.dmp family_lumma_v4 behavioral2/memory/576-33-0x0000000000400000-0x000000000073C000-memory.dmp family_lumma_v4 behavioral2/memory/576-36-0x0000000000400000-0x000000000073C000-memory.dmp family_lumma_v4 behavioral2/memory/1604-55-0x0000000000400000-0x000000000073C000-memory.dmp family_lumma_v4 behavioral2/memory/1604-58-0x0000000000400000-0x000000000073C000-memory.dmp family_lumma_v4 behavioral2/memory/3484-77-0x0000000000400000-0x000000000073C000-memory.dmp family_lumma_v4 behavioral2/memory/3484-81-0x0000000000400000-0x000000000073C000-memory.dmp family_lumma_v4 behavioral2/memory/1780-101-0x0000000000400000-0x000000000073C000-memory.dmp family_lumma_v4 behavioral2/memory/1780-117-0x0000000000400000-0x000000000073C000-memory.dmp family_lumma_v4 behavioral2/memory/2408-147-0x0000000000400000-0x000000000073C000-memory.dmp family_lumma_v4 behavioral2/memory/1632-149-0x0000000000400000-0x000000000073C000-memory.dmp family_lumma_v4 behavioral2/memory/4704-171-0x0000000000400000-0x000000000073C000-memory.dmp family_lumma_v4 behavioral2/memory/2408-173-0x0000000000400000-0x000000000073C000-memory.dmp family_lumma_v4 behavioral2/memory/4704-197-0x0000000000400000-0x000000000073C000-memory.dmp family_lumma_v4 behavioral2/memory/2948-196-0x0000000000400000-0x000000000073C000-memory.dmp family_lumma_v4 behavioral2/memory/2948-213-0x0000000000400000-0x000000000073C000-memory.dmp family_lumma_v4 behavioral2/memory/3344-221-0x0000000000400000-0x000000000073C000-memory.dmp family_lumma_v4 behavioral2/memory/3344-236-0x0000000000400000-0x000000000073C000-memory.dmp family_lumma_v4 -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 26a331b3df88e5e92a08b83e1e5693d0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 26a331b3df88e5e92a08b83e1e5693d0.exe -
resource yara_rule behavioral2/memory/4472-0-0x0000000000400000-0x000000000073C000-memory.dmp upx behavioral2/memory/4472-8-0x0000000000400000-0x000000000073C000-memory.dmp upx behavioral2/memory/4472-11-0x0000000000400000-0x000000000073C000-memory.dmp upx behavioral2/memory/4472-9-0x0000000000400000-0x000000000073C000-memory.dmp upx behavioral2/memory/4472-7-0x0000000000400000-0x000000000073C000-memory.dmp upx behavioral2/memory/576-28-0x0000000000400000-0x000000000073C000-memory.dmp upx behavioral2/memory/4472-32-0x0000000000400000-0x000000000073C000-memory.dmp upx behavioral2/memory/576-33-0x0000000000400000-0x000000000073C000-memory.dmp upx behavioral2/memory/576-27-0x0000000000400000-0x000000000073C000-memory.dmp upx behavioral2/memory/576-26-0x0000000000400000-0x000000000073C000-memory.dmp upx behavioral2/memory/576-36-0x0000000000400000-0x000000000073C000-memory.dmp upx behavioral2/memory/1604-47-0x0000000000400000-0x000000000073C000-memory.dmp upx behavioral2/memory/1604-55-0x0000000000400000-0x000000000073C000-memory.dmp upx behavioral2/memory/1604-48-0x0000000000400000-0x000000000073C000-memory.dmp upx behavioral2/memory/1604-46-0x0000000000400000-0x000000000073C000-memory.dmp upx behavioral2/memory/1604-58-0x0000000000400000-0x000000000073C000-memory.dmp upx behavioral2/memory/3484-70-0x0000000000400000-0x000000000073C000-memory.dmp upx behavioral2/memory/3484-77-0x0000000000400000-0x000000000073C000-memory.dmp upx behavioral2/memory/3484-71-0x0000000000400000-0x000000000073C000-memory.dmp upx behavioral2/memory/3484-69-0x0000000000400000-0x000000000073C000-memory.dmp upx behavioral2/memory/3484-81-0x0000000000400000-0x000000000073C000-memory.dmp upx behavioral2/memory/1780-101-0x0000000000400000-0x000000000073C000-memory.dmp upx behavioral2/memory/1780-94-0x0000000000400000-0x000000000073C000-memory.dmp upx behavioral2/memory/1780-93-0x0000000000400000-0x000000000073C000-memory.dmp upx behavioral2/memory/1780-92-0x0000000000400000-0x000000000073C000-memory.dmp upx behavioral2/memory/1780-117-0x0000000000400000-0x000000000073C000-memory.dmp upx behavioral2/memory/1632-125-0x0000000000400000-0x000000000073C000-memory.dmp upx behavioral2/memory/2408-147-0x0000000000400000-0x000000000073C000-memory.dmp upx behavioral2/memory/1632-149-0x0000000000400000-0x000000000073C000-memory.dmp upx behavioral2/memory/4704-171-0x0000000000400000-0x000000000073C000-memory.dmp upx behavioral2/memory/2408-173-0x0000000000400000-0x000000000073C000-memory.dmp upx behavioral2/memory/4704-197-0x0000000000400000-0x000000000073C000-memory.dmp upx behavioral2/memory/2948-196-0x0000000000400000-0x000000000073C000-memory.dmp upx -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{9887A353-6C33-F928-7F79-13981EAB8F53} 26a331b3df88e5e92a08b83e1e5693d0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\26a331b3df88e5e92a08b83e1e5693d0.exe"C:\Users\Admin\AppData\Local\Temp\26a331b3df88e5e92a08b83e1e5693d0.exe"1⤵
- Checks BIOS information in registry
- Modifies registry class
PID:4472 -
C:\Windows\SysWOW64\wplayer.exeC:\Windows\system32\wplayer.exe 1416 "C:\Users\Admin\AppData\Local\Temp\26a331b3df88e5e92a08b83e1e5693d0.exe"2⤵PID:576
-
C:\Windows\SysWOW64\wplayer.exeC:\Windows\system32\wplayer.exe 1436 "C:\Windows\SysWOW64\wplayer.exe"3⤵PID:1604
-
C:\Windows\SysWOW64\wplayer.exeC:\Windows\system32\wplayer.exe 1440 "C:\Windows\SysWOW64\wplayer.exe"4⤵PID:3484
-
C:\Windows\SysWOW64\wplayer.exeC:\Windows\system32\wplayer.exe 1448 "C:\Windows\SysWOW64\wplayer.exe"5⤵PID:1780
-
C:\Windows\SysWOW64\wplayer.exeC:\Windows\system32\wplayer.exe 1400 "C:\Windows\SysWOW64\wplayer.exe"6⤵PID:1632
-
C:\Windows\SysWOW64\wplayer.exeC:\Windows\system32\wplayer.exe 1456 "C:\Windows\SysWOW64\wplayer.exe"7⤵PID:2408
-
C:\Windows\SysWOW64\wplayer.exeC:\Windows\system32\wplayer.exe 1460 "C:\Windows\SysWOW64\wplayer.exe"8⤵PID:4704
-
C:\Windows\SysWOW64\wplayer.exeC:\Windows\system32\wplayer.exe 1428 "C:\Windows\SysWOW64\wplayer.exe"9⤵PID:2948
-
C:\Windows\SysWOW64\wplayer.exeC:\Windows\system32\wplayer.exe 1468 "C:\Windows\SysWOW64\wplayer.exe"10⤵PID:3344
-
C:\Windows\SysWOW64\wplayer.exeC:\Windows\system32\wplayer.exe 1472 "C:\Windows\SysWOW64\wplayer.exe"11⤵PID:2076
-
-
-
-
-
-
-
-
-
-