Malware Analysis Report

2025-06-15 19:52

Sample ID 240114-q3dq6sbbek
Target 5b64beac3ccc5e930abc126acb321f69
SHA256 f28ab8cbbb965f2322c5d9f027ce225fef5711a3d39bbc346a225e889e15c927
Tags
lumma evasion stealer themida
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

f28ab8cbbb965f2322c5d9f027ce225fef5711a3d39bbc346a225e889e15c927

Threat Level: Known bad

The file 5b64beac3ccc5e930abc126acb321f69 was found to be: Known bad.

Malicious Activity Summary

lumma evasion stealer themida

Detect Lumma Stealer payload V4

Lumma Stealer

Modifies security service

Identifies Wine through registry keys

Themida packer

Executes dropped EXE

Loads dropped DLL

Drops file in System32 directory

Unsigned PE

Runs .reg file with regedit

Suspicious behavior: EnumeratesProcesses

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-01-14 13:46

Signatures

Themida packer

themida
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-01-14 13:46

Reported

2024-01-14 13:49

Platform

win7-20231215-en

Max time kernel

145s

Max time network

126s

Command Line

"C:\Users\Admin\AppData\Local\Temp\5b64beac3ccc5e930abc126acb321f69.exe"

Signatures

Detect Lumma Stealer payload V4

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Lumma Stealer

stealer lumma

Modifies security service

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" C:\Windows\SysWOW64\regedit.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" C:\Windows\SysWOW64\regedit.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" C:\Windows\SysWOW64\regedit.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" C:\Windows\SysWOW64\regedit.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" C:\Windows\SysWOW64\regedit.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" C:\Windows\SysWOW64\regedit.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" C:\Windows\SysWOW64\regedit.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" C:\Windows\SysWOW64\regedit.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" C:\Windows\SysWOW64\regedit.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" C:\Windows\SysWOW64\regedit.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" C:\Windows\SysWOW64\regedit.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" C:\Windows\SysWOW64\regedit.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" C:\Windows\SysWOW64\regedit.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" C:\Windows\SysWOW64\regedit.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" C:\Windows\SysWOW64\regedit.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" C:\Windows\SysWOW64\regedit.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" C:\Windows\SysWOW64\regedit.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" C:\Windows\SysWOW64\regedit.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" C:\Windows\SysWOW64\regedit.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" C:\Windows\SysWOW64\regedit.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" C:\Windows\SysWOW64\regedit.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" C:\Windows\SysWOW64\regedit.exe N/A

Identifies Wine through registry keys

evasion
Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Wine C:\Windows\SysWOW64\sound.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Wine C:\Windows\SysWOW64\sound.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Wine C:\Windows\SysWOW64\sound.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Wine C:\Windows\SysWOW64\sound.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Wine C:\Windows\SysWOW64\sound.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Wine C:\Windows\SysWOW64\sound.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Wine C:\Windows\SysWOW64\sound.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\5b64beac3ccc5e930abc126acb321f69.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Wine C:\Windows\SysWOW64\sound.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Wine C:\Windows\SysWOW64\sound.exe N/A
Key opened \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Software\Wine C:\Windows\SysWOW64\sound.exe N/A

Themida packer

themida
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Drops file in System32 directory

Description Indicator Process Target
File created C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\sound.exe N/A
File created C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\sound.exe N/A
File opened for modification C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\sound.exe N/A
File opened for modification C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\sound.exe N/A
File opened for modification C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\sound.exe N/A
File opened for modification C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\sound.exe N/A
File created C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\sound.exe N/A
File opened for modification C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\sound.exe N/A
File opened for modification C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\sound.exe N/A
File opened for modification C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\sound.exe N/A
File opened for modification C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\sound.exe N/A
File opened for modification C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\sound.exe N/A
File created C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\sound.exe N/A
File created C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\sound.exe N/A
File created C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\sound.exe N/A
File opened for modification C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\sound.exe N/A
File created C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\sound.exe N/A
File created C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\sound.exe N/A
File created C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\sound.exe N/A
File created C:\Windows\SysWOW64\sound.exe C:\Users\Admin\AppData\Local\Temp\5b64beac3ccc5e930abc126acb321f69.exe N/A
File opened for modification C:\Windows\SysWOW64\sound.exe C:\Users\Admin\AppData\Local\Temp\5b64beac3ccc5e930abc126acb321f69.exe N/A
File created C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\sound.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 616 wrote to memory of 2792 N/A C:\Users\Admin\AppData\Local\Temp\5b64beac3ccc5e930abc126acb321f69.exe C:\Windows\SysWOW64\cmd.exe
PID 616 wrote to memory of 2792 N/A C:\Users\Admin\AppData\Local\Temp\5b64beac3ccc5e930abc126acb321f69.exe C:\Windows\SysWOW64\cmd.exe
PID 616 wrote to memory of 2792 N/A C:\Users\Admin\AppData\Local\Temp\5b64beac3ccc5e930abc126acb321f69.exe C:\Windows\SysWOW64\cmd.exe
PID 616 wrote to memory of 2792 N/A C:\Users\Admin\AppData\Local\Temp\5b64beac3ccc5e930abc126acb321f69.exe C:\Windows\SysWOW64\cmd.exe
PID 2792 wrote to memory of 2192 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\regedit.exe
PID 2792 wrote to memory of 2192 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\regedit.exe
PID 2792 wrote to memory of 2192 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\regedit.exe
PID 2792 wrote to memory of 2192 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\regedit.exe
PID 616 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\5b64beac3ccc5e930abc126acb321f69.exe C:\Windows\SysWOW64\sound.exe
PID 616 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\5b64beac3ccc5e930abc126acb321f69.exe C:\Windows\SysWOW64\sound.exe
PID 616 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\5b64beac3ccc5e930abc126acb321f69.exe C:\Windows\SysWOW64\sound.exe
PID 616 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\5b64beac3ccc5e930abc126acb321f69.exe C:\Windows\SysWOW64\sound.exe
PID 2260 wrote to memory of 2868 N/A C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\cmd.exe
PID 2260 wrote to memory of 2868 N/A C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\cmd.exe
PID 2260 wrote to memory of 2868 N/A C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\cmd.exe
PID 2260 wrote to memory of 2868 N/A C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\cmd.exe
PID 2868 wrote to memory of 864 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\regedit.exe
PID 2868 wrote to memory of 864 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\regedit.exe
PID 2868 wrote to memory of 864 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\regedit.exe
PID 2868 wrote to memory of 864 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\regedit.exe
PID 2260 wrote to memory of 1692 N/A C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\sound.exe
PID 2260 wrote to memory of 1692 N/A C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\sound.exe
PID 2260 wrote to memory of 1692 N/A C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\sound.exe
PID 2260 wrote to memory of 1692 N/A C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\sound.exe
PID 1692 wrote to memory of 2684 N/A C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\cmd.exe
PID 1692 wrote to memory of 2684 N/A C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\cmd.exe
PID 1692 wrote to memory of 2684 N/A C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\cmd.exe
PID 1692 wrote to memory of 2684 N/A C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\cmd.exe
PID 2684 wrote to memory of 2040 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\regedit.exe
PID 2684 wrote to memory of 2040 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\regedit.exe
PID 2684 wrote to memory of 2040 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\regedit.exe
PID 2684 wrote to memory of 2040 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\regedit.exe
PID 1692 wrote to memory of 2324 N/A C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\sound.exe
PID 1692 wrote to memory of 2324 N/A C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\sound.exe
PID 1692 wrote to memory of 2324 N/A C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\sound.exe
PID 1692 wrote to memory of 2324 N/A C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\sound.exe
PID 2324 wrote to memory of 2972 N/A C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\cmd.exe
PID 2324 wrote to memory of 2972 N/A C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\cmd.exe
PID 2324 wrote to memory of 2972 N/A C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\cmd.exe
PID 2324 wrote to memory of 2972 N/A C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\cmd.exe
PID 2972 wrote to memory of 1892 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\regedit.exe
PID 2972 wrote to memory of 1892 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\regedit.exe
PID 2972 wrote to memory of 1892 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\regedit.exe
PID 2972 wrote to memory of 1892 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\regedit.exe
PID 2324 wrote to memory of 1796 N/A C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\sound.exe
PID 2324 wrote to memory of 1796 N/A C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\sound.exe
PID 2324 wrote to memory of 1796 N/A C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\sound.exe
PID 2324 wrote to memory of 1796 N/A C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\sound.exe
PID 1796 wrote to memory of 2656 N/A C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\cmd.exe
PID 1796 wrote to memory of 2656 N/A C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\cmd.exe
PID 1796 wrote to memory of 2656 N/A C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\cmd.exe
PID 1796 wrote to memory of 2656 N/A C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\cmd.exe
PID 2656 wrote to memory of 1720 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\regedit.exe
PID 2656 wrote to memory of 1720 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\regedit.exe
PID 2656 wrote to memory of 1720 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\regedit.exe
PID 2656 wrote to memory of 1720 N/A C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\regedit.exe
PID 1796 wrote to memory of 2276 N/A C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\sound.exe
PID 1796 wrote to memory of 2276 N/A C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\sound.exe
PID 1796 wrote to memory of 2276 N/A C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\sound.exe
PID 1796 wrote to memory of 2276 N/A C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\sound.exe
PID 2276 wrote to memory of 2728 N/A C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2728 N/A C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2728 N/A C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\cmd.exe
PID 2276 wrote to memory of 2728 N/A C:\Windows\SysWOW64\sound.exe C:\Windows\SysWOW64\cmd.exe

Processes

C:\Users\Admin\AppData\Local\Temp\5b64beac3ccc5e930abc126acb321f69.exe

"C:\Users\Admin\AppData\Local\Temp\5b64beac3ccc5e930abc126acb321f69.exe"

C:\Windows\SysWOW64\cmd.exe

cmd /c c:\a.bat

C:\Windows\SysWOW64\sound.exe

C:\Windows\system32\sound.exe 708 "C:\Users\Admin\AppData\Local\Temp\5b64beac3ccc5e930abc126acb321f69.exe"

C:\Windows\SysWOW64\regedit.exe

REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg

C:\Windows\SysWOW64\cmd.exe

cmd /c c:\a.bat

C:\Windows\SysWOW64\regedit.exe

REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg

C:\Windows\SysWOW64\sound.exe

C:\Windows\system32\sound.exe 716 "C:\Windows\SysWOW64\sound.exe"

C:\Windows\SysWOW64\cmd.exe

cmd /c c:\a.bat

C:\Windows\SysWOW64\regedit.exe

REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg

C:\Windows\SysWOW64\sound.exe

C:\Windows\system32\sound.exe 724 "C:\Windows\SysWOW64\sound.exe"

C:\Windows\SysWOW64\cmd.exe

cmd /c c:\a.bat

C:\Windows\SysWOW64\regedit.exe

REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg

C:\Windows\SysWOW64\sound.exe

C:\Windows\system32\sound.exe 720 "C:\Windows\SysWOW64\sound.exe"

C:\Windows\SysWOW64\cmd.exe

cmd /c c:\a.bat

C:\Windows\SysWOW64\regedit.exe

REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg

C:\Windows\SysWOW64\sound.exe

C:\Windows\system32\sound.exe 732 "C:\Windows\SysWOW64\sound.exe"

C:\Windows\SysWOW64\cmd.exe

cmd /c c:\a.bat

C:\Windows\SysWOW64\regedit.exe

REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg

C:\Windows\SysWOW64\sound.exe

C:\Windows\system32\sound.exe 736 "C:\Windows\SysWOW64\sound.exe"

C:\Windows\SysWOW64\cmd.exe

cmd /c c:\a.bat

C:\Windows\SysWOW64\regedit.exe

REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg

C:\Windows\SysWOW64\sound.exe

C:\Windows\system32\sound.exe 740 "C:\Windows\SysWOW64\sound.exe"

C:\Windows\SysWOW64\regedit.exe

REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg

C:\Windows\SysWOW64\cmd.exe

cmd /c c:\a.bat

C:\Windows\SysWOW64\sound.exe

C:\Windows\system32\sound.exe 728 "C:\Windows\SysWOW64\sound.exe"

C:\Windows\SysWOW64\cmd.exe

cmd /c c:\a.bat

C:\Windows\SysWOW64\regedit.exe

REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg

C:\Windows\SysWOW64\sound.exe

C:\Windows\system32\sound.exe 744 "C:\Windows\SysWOW64\sound.exe"

C:\Windows\SysWOW64\cmd.exe

cmd /c c:\a.bat

C:\Windows\SysWOW64\regedit.exe

REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg

C:\Windows\SysWOW64\sound.exe

C:\Windows\system32\sound.exe 748 "C:\Windows\SysWOW64\sound.exe"

C:\Windows\SysWOW64\cmd.exe

cmd /c c:\a.bat

C:\Windows\SysWOW64\regedit.exe

REGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg

Network

N/A

Files

memory/616-0-0x0000000000400000-0x00000000007BB000-memory.dmp

memory/616-1-0x00000000002E0000-0x00000000002E1000-memory.dmp

memory/616-2-0x0000000002070000-0x0000000002166000-memory.dmp

C:\a.bat

MD5 0019a0451cc6b9659762c3e274bc04fb
SHA1 5259e256cc0908f2846e532161b989f1295f479b
SHA256 ce4674afd978d1401596d22a0961f90c8fb53c5bd55649684e1a999c8cf77876
SHA512 314c23ec37cb0cd4443213c019c4541df968447353b422ef6fff1e7ddf6c983c80778787408b7ca9b81e580a6a7f1589ca7f43c022e6fc16182973580ed4d904

memory/616-10-0x0000000000400000-0x00000000007BB000-memory.dmp

memory/616-11-0x0000000004470000-0x0000000004471000-memory.dmp

memory/616-12-0x0000000004440000-0x0000000004441000-memory.dmp

memory/616-25-0x0000000004460000-0x0000000004461000-memory.dmp

memory/616-24-0x0000000004410000-0x0000000004411000-memory.dmp

memory/616-23-0x00000000044B0000-0x00000000044B1000-memory.dmp

memory/616-22-0x00000000044F0000-0x00000000044F1000-memory.dmp

memory/616-21-0x00000000044C0000-0x00000000044C1000-memory.dmp

memory/616-20-0x0000000004510000-0x0000000004511000-memory.dmp

memory/616-19-0x00000000043F0000-0x00000000043F1000-memory.dmp

memory/616-18-0x0000000004400000-0x0000000004402000-memory.dmp

memory/616-17-0x00000000044A0000-0x00000000044A2000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1.reg

MD5 d8be0d42e512d922804552250f01eb90
SHA1 cda2fd8fc9c4cdf15d5e2f07a4c633e21d11c9d3
SHA256 901619f668fe541b53d809cd550460f579985c3d2f3d899a557997e778eb1d82
SHA512 f53619e1ec3c9abc833f9fca1174529fb4a4723b64f7560059cd3147d74ea8fe945a7bd0034f6fb68c0e61b6782a26908d30a749a256e019031b5a6ac088eb97

memory/616-16-0x00000000044D0000-0x00000000044D1000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\1.reg

MD5 9e5db93bd3302c217b15561d8f1e299d
SHA1 95a5579b336d16213909beda75589fd0a2091f30
SHA256 f360fb5740172b6b4dd59c1ac30b480511665ae991196f833167e275d91f943e
SHA512 b5547e5047a3c43397ee846ff9d5979cba45ba44671db5c5df5536d9dc26262e27a8645a08e0cf35960a3601dc0f6f5fe8d47ae232c9ca44d6899e97d36fb25a

memory/616-15-0x00000000044E0000-0x00000000044E1000-memory.dmp

memory/616-14-0x0000000004430000-0x0000000004432000-memory.dmp

memory/616-13-0x0000000004500000-0x0000000004502000-memory.dmp

memory/616-134-0x0000000004480000-0x0000000004481000-memory.dmp

\Windows\SysWOW64\sound.exe

MD5 5b64beac3ccc5e930abc126acb321f69
SHA1 af5e1e302babb0c8ace3b32e62939b5a384fc995
SHA256 f28ab8cbbb965f2322c5d9f027ce225fef5711a3d39bbc346a225e889e15c927
SHA512 f12b15c0cb36d4b44ea808656a0e5d047a439951f78ef4d5f9ccac7c2a58bea0c9e7ba964a8b0e265202e39c3f6bf8ebd8ee70b2d731bc9765a10af22ff94730

memory/2260-146-0x0000000000400000-0x00000000007BB000-memory.dmp

memory/2260-147-0x00000000002E0000-0x00000000002E1000-memory.dmp

memory/616-149-0x0000000000400000-0x00000000007BB000-memory.dmp

memory/616-148-0x0000000004B50000-0x0000000004F0B000-memory.dmp

memory/616-144-0x0000000004B50000-0x0000000004F0B000-memory.dmp

C:\Windows\SysWOW64\sound.exe

MD5 86d4033ebb1c5d06cef3d63fd0f24790
SHA1 58760d76fa8caf84ec0e58529ded32e8e02eb1f2
SHA256 804a5ef5292cb0dfb93292de582b52c23aaf95bf28142953fa2d3a84a2947155
SHA512 16147bd9148f5778a075056bfb1d8f1a8839e31bff387d917ed9d1bbd626f8b50a588db60019fad12966b0722d9812007a5f1bc8985456cc5988b387fd13b2aa

memory/2260-152-0x0000000004490000-0x0000000004491000-memory.dmp

memory/2260-267-0x0000000004460000-0x0000000004461000-memory.dmp

memory/2260-270-0x0000000004450000-0x0000000004451000-memory.dmp

memory/2260-271-0x00000000044F0000-0x00000000044F1000-memory.dmp

memory/2260-273-0x00000000044B0000-0x00000000044B2000-memory.dmp

memory/2260-272-0x00000000044E0000-0x00000000044E1000-memory.dmp

memory/2260-283-0x00000000044A0000-0x00000000044A1000-memory.dmp

memory/2260-282-0x0000000004480000-0x0000000004481000-memory.dmp

memory/2260-281-0x0000000004410000-0x0000000004411000-memory.dmp

memory/2260-280-0x0000000004420000-0x0000000004421000-memory.dmp

memory/2260-279-0x00000000044C0000-0x00000000044C1000-memory.dmp

memory/2260-278-0x00000000044D0000-0x00000000044D1000-memory.dmp

memory/2260-277-0x0000000004520000-0x0000000004521000-memory.dmp

memory/2260-276-0x00000000043F0000-0x00000000043F1000-memory.dmp

memory/2260-275-0x0000000004500000-0x0000000004501000-memory.dmp

memory/2260-274-0x0000000004400000-0x0000000004401000-memory.dmp

C:\Windows\SysWOW64\sound.exe

MD5 1801590458979467498505e379109ec3
SHA1 1889764d4d9a35444985de8d13208a93abd218a4
SHA256 36098098f63c2d323273db2728f4f280be6f7a20641fdaf5599a7322a75a7ca6
SHA512 25430d8839c6a57bd5a081dc10e67e47ed21649accc4a3c98335d0f9b6d11a60f4ed9b72dc06bce5016bd14e41a14e5f5f4964601d2815a77cdd772631cbb5ae

memory/2260-268-0x0000000004510000-0x0000000004512000-memory.dmp

memory/2260-151-0x0000000000400000-0x00000000007BB000-memory.dmp

memory/2260-284-0x0000000000400000-0x00000000007BB000-memory.dmp

memory/2260-288-0x0000000000400000-0x00000000007BB000-memory.dmp

memory/2260-289-0x00000000002E0000-0x00000000002E1000-memory.dmp

memory/2260-291-0x0000000004B70000-0x0000000004F2B000-memory.dmp

memory/2260-293-0x0000000004B70000-0x0000000004F2B000-memory.dmp

memory/1692-294-0x0000000000400000-0x00000000007BB000-memory.dmp

memory/1692-295-0x0000000000270000-0x0000000000271000-memory.dmp

memory/2260-292-0x0000000000400000-0x00000000007BB000-memory.dmp

memory/2260-290-0x0000000004470000-0x0000000004471000-memory.dmp

memory/1692-410-0x0000000000400000-0x00000000007BB000-memory.dmp

memory/1692-413-0x0000000004440000-0x0000000004441000-memory.dmp

memory/1692-415-0x0000000004430000-0x0000000004431000-memory.dmp

memory/1692-414-0x0000000004500000-0x0000000004502000-memory.dmp

memory/1692-417-0x00000000044D0000-0x00000000044D1000-memory.dmp

memory/1692-416-0x00000000044E0000-0x00000000044E1000-memory.dmp

memory/1692-411-0x0000000004470000-0x0000000004471000-memory.dmp

memory/1692-420-0x00000000044F0000-0x00000000044F1000-memory.dmp

memory/1692-419-0x0000000004400000-0x0000000004402000-memory.dmp

memory/1692-418-0x00000000044A0000-0x00000000044A2000-memory.dmp

memory/1692-421-0x0000000004230000-0x0000000004231000-memory.dmp

memory/1692-423-0x00000000044C0000-0x00000000044C1000-memory.dmp

memory/1692-425-0x0000000004410000-0x0000000004411000-memory.dmp

memory/1692-424-0x00000000044B0000-0x00000000044B1000-memory.dmp

memory/1692-422-0x0000000004510000-0x0000000004511000-memory.dmp

memory/1692-428-0x0000000000400000-0x00000000007BB000-memory.dmp

memory/1692-434-0x0000000000400000-0x00000000007BB000-memory.dmp

memory/2324-554-0x0000000000400000-0x00000000007BB000-memory.dmp

memory/1796-673-0x0000000000400000-0x00000000007BB000-memory.dmp

\Windows\SysWOW64\sound.exe

MD5 2456392ab2729f60fbb88b275163a235
SHA1 9d4a772c4de1ac5f1076f3e4d63bd0bf0baa8560
SHA256 766efbcc213ee708856648f4f0f51cdcea1bd5e2223af9ae0f6d1932f03e9680
SHA512 f010e4ef8f9c0f660ea99de032be19d77eec24d548e8c2b9f06cbb71188c2f832c19ca27fb93d11aec547405db6c5c519f15d9dd36d4c54ce32fc8635df23dbe

\Windows\SysWOW64\sound.exe

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

memory/2276-792-0x0000000000400000-0x00000000007BB000-memory.dmp

memory/1512-911-0x0000000000400000-0x00000000007BB000-memory.dmp

memory/1820-1030-0x0000000000400000-0x00000000007BB000-memory.dmp

memory/1556-1149-0x0000000000400000-0x00000000007BB000-memory.dmp

memory/472-1268-0x0000000000400000-0x00000000007BB000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-01-14 13:46

Reported

2024-01-14 13:49

Platform

win10v2004-20231215-en

Max time kernel

142s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\5b64beac3ccc5e930abc126acb321f69.exe"

Signatures

Identifies Wine through registry keys

evasion
Description Indicator Process Target
Key opened \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Software\Wine C:\Users\Admin\AppData\Local\Temp\5b64beac3ccc5e930abc126acb321f69.exe N/A

Themida packer

themida
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\5b64beac3ccc5e930abc126acb321f69.exe

"C:\Users\Admin\AppData\Local\Temp\5b64beac3ccc5e930abc126acb321f69.exe"

Network

Country Destination Domain Proto
US 138.91.171.81:80 tcp
US 8.8.8.8:53 18.53.126.40.in-addr.arpa udp
US 8.8.8.8:53 194.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 2.136.104.51.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 41.110.16.96.in-addr.arpa udp
US 8.8.8.8:53 59.128.231.4.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 18.134.221.88.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 14.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 170.117.168.52.in-addr.arpa udp

Files

memory/2968-0-0x0000000000400000-0x00000000007BB000-memory.dmp

memory/2968-1-0x0000000000DF0000-0x0000000000DF1000-memory.dmp

memory/2968-2-0x00000000024D0000-0x00000000025C6000-memory.dmp

memory/2968-3-0x0000000000400000-0x00000000007BB000-memory.dmp

memory/2968-4-0x0000000000DF0000-0x0000000000DF1000-memory.dmp