Overview
overview
10Static
static
10Samples 6/...ca.exe
windows7-x64
7Samples 6/...ca.exe
windows10-2004-x64
7Samples 6/...4e.exe
windows7-x64
10Samples 6/...4e.exe
windows10-2004-x64
10Samples 6/...31.exe
windows7-x64
10Samples 6/...31.exe
windows10-2004-x64
10Samples 6/...4b.exe
windows7-x64
7Samples 6/...4b.exe
windows10-2004-x64
7Samples 6/...1a.exe
windows7-x64
10Samples 6/...1a.exe
windows10-2004-x64
10Samples 6/...18.exe
windows7-x64
1Samples 6/...18.exe
windows10-2004-x64
1Samples 7/...22.exe
windows7-x64
3Samples 7/...22.exe
windows10-2004-x64
3Samples 7/...41.exe
windows7-x64
10Samples 7/...41.exe
windows10-2004-x64
10Samples 7/...62.exe
windows7-x64
10Samples 7/...62.exe
windows10-2004-x64
10Samples 7/...c5.exe
windows7-x64
10Samples 7/...c5.exe
windows10-2004-x64
10Samples 7/...a6.exe
windows7-x64
10Samples 7/...a6.exe
windows10-2004-x64
10Samples 7/...64.exe
windows7-x64
10Samples 7/...64.exe
windows10-2004-x64
10Samples 7/...a5.exe
windows7-x64
10Samples 7/...a5.exe
windows10-2004-x64
10Samples 7/...0d.exe
windows7-x64
10Samples 7/...0d.exe
windows10-2004-x64
10Samples 7/...de.exe
windows7-x64
7Samples 7/...de.exe
windows10-2004-x64
7Samples 7/...de.exe
windows7-x64
10Samples 7/...de.exe
windows10-2004-x64
10Resubmissions
07-01-2024 18:26
240107-w3ameabffn 10Analysis
-
max time kernel
118s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
07-01-2024 18:26
Static task
static1
Behavioral task
behavioral1
Sample
Samples 6/c4ec2c4d73a45bba85debe9fe243708bb52afd29dc95d7fdefed02cd34c375ca.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
Samples 6/c4ec2c4d73a45bba85debe9fe243708bb52afd29dc95d7fdefed02cd34c375ca.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
Samples 6/c6befd3879040aeca88afd9b461177c9a3fc830f2020f2878696ddca0cea994e.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Samples 6/c6befd3879040aeca88afd9b461177c9a3fc830f2020f2878696ddca0cea994e.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Samples 6/c76d7f244175880387474af937c59ad2cbfec2f4bdfdefdf0a9d1def029faa31.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Samples 6/c76d7f244175880387474af937c59ad2cbfec2f4bdfdefdf0a9d1def029faa31.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
Samples 6/c808c7043bbe6f22fdae5e9ad031db55e2ec385489a53ad3096985e53292244b.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
Samples 6/c808c7043bbe6f22fdae5e9ad031db55e2ec385489a53ad3096985e53292244b.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
Samples 6/ca181f57edb3d99fbdfd1a512a783d266d479c2fd38ffea14742771df7ba2c1a.exe
Resource
win7-20231129-en
Behavioral task
behavioral10
Sample
Samples 6/ca181f57edb3d99fbdfd1a512a783d266d479c2fd38ffea14742771df7ba2c1a.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
Samples 6/cd22c1aabcafc40bf81d42b42e625e49eff9e0f928fa961e43573e1eb45ace18.exe
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
Samples 6/cd22c1aabcafc40bf81d42b42e625e49eff9e0f928fa961e43573e1eb45ace18.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral13
Sample
Samples 7/d097ca2583425f648592138b57562334c0b83d3179634fd43a0b611bdf720122.exe
Resource
win7-20231129-en
Behavioral task
behavioral14
Sample
Samples 7/d097ca2583425f648592138b57562334c0b83d3179634fd43a0b611bdf720122.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral15
Sample
Samples 7/d0d97c70ea6e26b3708dc101a310f056d690bbc17306c493ccba4a6f00fad541.exe
Resource
win7-20231215-en
Behavioral task
behavioral16
Sample
Samples 7/d0d97c70ea6e26b3708dc101a310f056d690bbc17306c493ccba4a6f00fad541.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral17
Sample
Samples 7/d3d18f34a1494d87502f0ea05c56f6194e50610bc71f53653e15c98d25e57e62.exe
Resource
win7-20231215-en
Behavioral task
behavioral18
Sample
Samples 7/d3d18f34a1494d87502f0ea05c56f6194e50610bc71f53653e15c98d25e57e62.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral19
Sample
Samples 7/da52dc0f002d544115f1d64dbc1d7ec9569be150d59cfe0bfd3f6bb5aed54dc5.exe
Resource
win7-20231215-en
Behavioral task
behavioral20
Sample
Samples 7/da52dc0f002d544115f1d64dbc1d7ec9569be150d59cfe0bfd3f6bb5aed54dc5.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral21
Sample
Samples 7/dcf250dc8a9683cf5a3e7dfdb441b06e15b391a8c5d97b31431c650a715432a6.exe
Resource
win7-20231215-en
Behavioral task
behavioral22
Sample
Samples 7/dcf250dc8a9683cf5a3e7dfdb441b06e15b391a8c5d97b31431c650a715432a6.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
Samples 7/dd225dc0284234d7ec035b06461bb9e15a5851fa4414d0a3c67541297bef8c64.exe
Resource
win7-20231215-en
Behavioral task
behavioral24
Sample
Samples 7/dd225dc0284234d7ec035b06461bb9e15a5851fa4414d0a3c67541297bef8c64.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral25
Sample
Samples 7/dde59b015e0acd1910513cf1da07f3b17d6530816d663c102ed9ad6ab6d575a5.exe
Resource
win7-20231129-en
Behavioral task
behavioral26
Sample
Samples 7/dde59b015e0acd1910513cf1da07f3b17d6530816d663c102ed9ad6ab6d575a5.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral27
Sample
Samples 7/e396aa398fb1fa0f6c9db780211f758649e9a1f26bb5a2e7026b1cfec6ea9c0d.exe
Resource
win7-20231129-en
Behavioral task
behavioral28
Sample
Samples 7/e396aa398fb1fa0f6c9db780211f758649e9a1f26bb5a2e7026b1cfec6ea9c0d.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral29
Sample
Samples 7/e5474bdcb0a87bd6c1c74d6a2fd6cff6c8ff913248b84e22c1ef5e82cb6f5cde.exe
Resource
win7-20231215-en
Behavioral task
behavioral30
Sample
Samples 7/e5474bdcb0a87bd6c1c74d6a2fd6cff6c8ff913248b84e22c1ef5e82cb6f5cde.exe
Resource
win10v2004-20231215-en
General
-
Target
Samples 7/e396aa398fb1fa0f6c9db780211f758649e9a1f26bb5a2e7026b1cfec6ea9c0d.exe
-
Size
1.7MB
-
MD5
710785459d065a7e822861764ec36480
-
SHA1
d7d641f65e380e71f13dd04a6a37c903b532fb32
-
SHA256
e396aa398fb1fa0f6c9db780211f758649e9a1f26bb5a2e7026b1cfec6ea9c0d
-
SHA512
7fc4596b4cc119c9f939d4577e54c788dccd3c9aa84d8bfcd8dde14ee22da8b525b5c06201c045634e346444c78bf923c5e203e88af7717fac80178f52f7fa45
-
SSDEEP
24576:TV+UOwZmL/nvlkykFlTrAEdghT0WUQ2YUhOxiq2p7j4jNyXpcHLYiSHdX3Ra/KhV:TXZnl3AEyRV2YUIxPsDnI/wM2
Malware Config
Extracted
lumma
http://zamesblack.fun/api
Signatures
-
Detect Lumma Stealer payload V4 4 IoCs
resource yara_rule behavioral27/memory/2672-31-0x0000000003B50000-0x0000000003BD6000-memory.dmp family_lumma_v4 behavioral27/memory/2672-32-0x0000000003B50000-0x0000000003BD6000-memory.dmp family_lumma_v4 behavioral27/memory/2672-33-0x0000000003B50000-0x0000000003BD6000-memory.dmp family_lumma_v4 behavioral27/memory/2672-34-0x0000000003B50000-0x0000000003BD6000-memory.dmp family_lumma_v4 -
Executes dropped EXE 1 IoCs
pid Process 2672 Angle.pif -
Loads dropped DLL 1 IoCs
pid Process 2896 cmd.exe -
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 1840 tasklist.exe 2656 tasklist.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1600 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2672 Angle.pif 2672 Angle.pif 2672 Angle.pif 2672 Angle.pif -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1840 tasklist.exe Token: SeDebugPrivilege 2656 tasklist.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2672 Angle.pif 2672 Angle.pif 2672 Angle.pif -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2672 Angle.pif 2672 Angle.pif 2672 Angle.pif -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 1832 wrote to memory of 2836 1832 e396aa398fb1fa0f6c9db780211f758649e9a1f26bb5a2e7026b1cfec6ea9c0d.exe 29 PID 1832 wrote to memory of 2836 1832 e396aa398fb1fa0f6c9db780211f758649e9a1f26bb5a2e7026b1cfec6ea9c0d.exe 29 PID 1832 wrote to memory of 2836 1832 e396aa398fb1fa0f6c9db780211f758649e9a1f26bb5a2e7026b1cfec6ea9c0d.exe 29 PID 1832 wrote to memory of 2836 1832 e396aa398fb1fa0f6c9db780211f758649e9a1f26bb5a2e7026b1cfec6ea9c0d.exe 29 PID 2836 wrote to memory of 2896 2836 cmd.exe 30 PID 2836 wrote to memory of 2896 2836 cmd.exe 30 PID 2836 wrote to memory of 2896 2836 cmd.exe 30 PID 2836 wrote to memory of 2896 2836 cmd.exe 30 PID 2896 wrote to memory of 1840 2896 cmd.exe 31 PID 2896 wrote to memory of 1840 2896 cmd.exe 31 PID 2896 wrote to memory of 1840 2896 cmd.exe 31 PID 2896 wrote to memory of 1840 2896 cmd.exe 31 PID 2896 wrote to memory of 2304 2896 cmd.exe 32 PID 2896 wrote to memory of 2304 2896 cmd.exe 32 PID 2896 wrote to memory of 2304 2896 cmd.exe 32 PID 2896 wrote to memory of 2304 2896 cmd.exe 32 PID 2896 wrote to memory of 2656 2896 cmd.exe 34 PID 2896 wrote to memory of 2656 2896 cmd.exe 34 PID 2896 wrote to memory of 2656 2896 cmd.exe 34 PID 2896 wrote to memory of 2656 2896 cmd.exe 34 PID 2896 wrote to memory of 2800 2896 cmd.exe 35 PID 2896 wrote to memory of 2800 2896 cmd.exe 35 PID 2896 wrote to memory of 2800 2896 cmd.exe 35 PID 2896 wrote to memory of 2800 2896 cmd.exe 35 PID 2896 wrote to memory of 2548 2896 cmd.exe 36 PID 2896 wrote to memory of 2548 2896 cmd.exe 36 PID 2896 wrote to memory of 2548 2896 cmd.exe 36 PID 2896 wrote to memory of 2548 2896 cmd.exe 36 PID 2896 wrote to memory of 2680 2896 cmd.exe 37 PID 2896 wrote to memory of 2680 2896 cmd.exe 37 PID 2896 wrote to memory of 2680 2896 cmd.exe 37 PID 2896 wrote to memory of 2680 2896 cmd.exe 37 PID 2896 wrote to memory of 2696 2896 cmd.exe 38 PID 2896 wrote to memory of 2696 2896 cmd.exe 38 PID 2896 wrote to memory of 2696 2896 cmd.exe 38 PID 2896 wrote to memory of 2696 2896 cmd.exe 38 PID 2896 wrote to memory of 2672 2896 cmd.exe 39 PID 2896 wrote to memory of 2672 2896 cmd.exe 39 PID 2896 wrote to memory of 2672 2896 cmd.exe 39 PID 2896 wrote to memory of 2672 2896 cmd.exe 39 PID 2896 wrote to memory of 1600 2896 cmd.exe 40 PID 2896 wrote to memory of 1600 2896 cmd.exe 40 PID 2896 wrote to memory of 1600 2896 cmd.exe 40 PID 2896 wrote to memory of 1600 2896 cmd.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\Samples 7\e396aa398fb1fa0f6c9db780211f758649e9a1f26bb5a2e7026b1cfec6ea9c0d.exe"C:\Users\Admin\AppData\Local\Temp\Samples 7\e396aa398fb1fa0f6c9db780211f758649e9a1f26bb5a2e7026b1cfec6ea9c0d.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\cmd.execmd /k cmd < Catch & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\cmd.execmd3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1840
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"4⤵PID:2304
-
-
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
-
C:\Windows\SysWOW64\findstr.exefindstr /I "wrsa.exe"4⤵PID:2800
-
-
C:\Windows\SysWOW64\cmd.execmd /c mkdir 169864⤵PID:2548
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Jobs + Promo + Rally + Latinas + Assumes 16986\Angle.pif4⤵PID:2680
-
-
C:\Windows\SysWOW64\cmd.execmd /c copy /b Armstrong + Who + Standing 16986\C4⤵PID:2696
-
-
C:\Users\Admin\AppData\Local\Temp\15289\16986\Angle.pif16986\Angle.pif 16986\C4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2672
-
-
C:\Windows\SysWOW64\PING.EXEping -n 5 localhost4⤵
- Runs ping.exe
PID:1600
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
924KB
MD5848164d084384c49937f99d5b894253e
SHA13055ef803eeec4f175ebf120f94125717ee12444
SHA256f58d3a4b2f3f7f10815c24586fae91964eeed830369e7e0701b43895b0cefbd3
SHA512aabe1cf076f48f32542f49a92e4ca9f054b31d5a9949119991b897b9489fe775d8009896408ba49ac43ec431c87c0d385daead9dbbde7ef6309b0c97bbaf852a
-
Filesize
92KB
MD583e39edba38a744f3a80f04d1a326ea0
SHA16346824e6d0e58d6d24921f53515c8d996d058fb
SHA2568b19b05030faf3408f512b2345d92fbd292976bb4bf257c1d1b9de3bcbe63cc2
SHA5121a21c2e8c3d011e56d90ff3b22646e80364452ce25ae840a8de5807289f4fc72bc4422b7bb0f80f11ae786d302538e48542ec7eba05161f880dde5d2cfbed107
-
Filesize
92KB
MD5e081899ac203761fd2f8331ea1ab5717
SHA10033ede933253fe051dc02ceb950731c2337bc42
SHA256f2877d83883c3c14cd6d6c6f41cba01c8b27d964ef29a36bd724eb632639e82f
SHA512af2a55073a597f268cb7b91f3882d42c208727e2dcd3ae208f18274342ea1a8dd949b4143e5d33517b6fd6407fe7624f3791a9407f53ade5477008e7e55d6a22
-
Filesize
423KB
MD59ef598da23f3cd6cb1ddfb589e43189f
SHA1dfacfbf8c2009b94d4784111c40f4003ed6c793c
SHA256422fc32f4ebffac3e75ba2c5073780dcc67cad64e03f379153a63f29fdd2bd56
SHA512be81c6c1918b9db09b467c01d6ac62e30526e24811853472fd2a4254cd808dd82cfa81739b07af2276fddcd03646cc2b04b9007cebb1be1acc256beaa51134de
-
Filesize
278KB
MD56850d82a929aa9638756704d1ee8a544
SHA179a67a37d7bc491d353365897483f0081d89cb10
SHA2563e34a511e700b4fef15d98c9a2d2dadc589194d4010077b387fda740353d3a95
SHA5121a9a9a284b71635e612ef800d652705e104d7233458e968d0b41cd27b8af0e09e1c32499110f38720413d98d7bdea396431a3963c717aab73df5afde25a9629a
-
Filesize
12KB
MD5718bb1691450f42b1a46fe23f2eb507f
SHA16e5fcd14d4f5511b969699e650024e731b0b49aa
SHA256461155c91a86d6ff3ed6d517a459b36ab53e1f73ede7f054578c26e9284d3f80
SHA5127188c1c24db1624d602f48e60d834f3b71d70f975a00e7e1e6298113266339fb55a14101c51fa251494d9d2614a1a592beb29d2376c570cc8187353f19ec1cff
-
Filesize
257KB
MD5102c7e49642516f9821d97b94ebdbdb7
SHA1de28c06d5de6b689859a6d98a5d9bc656b0530d7
SHA2566f47049fcdb5d2e5fe4ef66ce428794379f97b2099e97798406d666a1c187ed8
SHA5125f067423bd94de1fe35fda9bb972502c11e4c26f224b05a1f9a56dad8caf0ea64d058772f202ba659c3036e493d7d22f68b38a043f8b51e5ce2d0eb25f2dc61b
-
Filesize
108KB
MD5c40de8b387bc0d237a37c945c3af3288
SHA166a93a7bb3b9db0b9a77247559c93db3ffb4ed8d
SHA256fb0fd4d0ca1080a431792aba2f0c9018c6656bedcfc8536a15f0dd48db7bfcf9
SHA512697a5d0f4e64b15d4bf389e829231ce668b7ad9253d4628c85fc8de70cfd31ff28bd40681ebc078365cd1f7b933c58a70e7c6b3b2d7232c944d0817785348347
-
Filesize
129KB
MD56494d8de7e5c15e5d636474e0a650fe6
SHA11aedd0ed9c1310a691f8a420617db357ebab8430
SHA256e50b45a5d2f5d0ef07b1098f086fe7d365a6858239ece89d23540f52031914ee
SHA512d7c84f1f737947d6929d8183700d48656c6ddf6f495d0e2aab673dfe4ac75e7b6e70e3e7ede4493162f1d3677860ec6236b56fc7662f307952a108d397e68196
-
Filesize
152KB
MD5cd2e635cabae7d929cd246778dbfb69b
SHA136dc87dae8c8b0e74993a6344a710096c7c08df9
SHA2561422ab4975976de3009c7ec349a7e884aab78be0d500cda9dc667f97875d5f3c
SHA512382adc28eb085f5b27ad72c9795e308f222a7caf7062e6e4e0cfb6d701a08b5f12d2778733d78f0272fe69543305fb55e3b6b19a6c26d3b41d2d837abdb382b6
-
Filesize
241KB
MD5e701bf28bbf816c83af809f9e49fead3
SHA15df6c66e4c4273b198df4cf0d032af259e87add7
SHA2565890b69fae8e2cfd953ba20417218a2488e5b22808f2cc2471e7169cb01905fc
SHA512071ee1fc7249a9462e25d352e70f12067ef916a3c8810aae5887d17c5b47737570bd5ab0d3f55fa49e7dba4604adc18451757dba71eba64ba3623b6af5d5dada
-
Filesize
400KB
MD5fffb5356e6db9b95590db265c8ae6d6e
SHA1113e8c89aae36df57f5dd8f27b96825f48d30202
SHA256837c0f706fcaf7c5a62043749bf59cc0a6596a51847e49fde7e83b57c735712a
SHA512774352afcbbae36bb57ee65e4c36b0d82b6f7aaa6e1534ebaa1c4a9d6cb5f558cdb264325a04ff9beb2797991f9a29a883ed65539fadc86972186d721ccae623
-
Filesize
449KB
MD5efd0ec28e1d79a73a503acbb162f4d22
SHA1f63d7f9a9a0fb20e0436926aa15b8b8e3b701182
SHA2568d4b3dbd81a54bee76e02408cd337873681f030a63406d64ff8d16724715ef32
SHA512f286597864cea252bd4d471df5e4e4a793b7e72aef5a8d0d4429c71512f7eb8051751314f99eb94cb6c8438a9953680f21131c245e341c786f2193c9c66726fc