Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/03/2024, 05:57

General

  • Target

    tmp.exe

  • Size

    454KB

  • MD5

    5abd2bda4e977edcb6ea8bad53084809

  • SHA1

    e0d07424d71edd4945ba9cee7ac972bdef973188

  • SHA256

    cec9695af44751223a659fcf55a23874aaebfe97e44237bddbc68ee8cd448c9d

  • SHA512

    3f3e6d9f2bbb489a25589c9fe3438090e3448afd89763923fc0f1e7b97b4a066d330ebd2b510c229f669c7e20c1f57fa85716de147791ea066b94dc149fa174d

  • SSDEEP

    6144:Wi1tN0iF8jF7xeumh7ktWltF8mM84L+lPLb2/0s6ScZjMfBHNX2J+22:pNPudSs0nlPu0s6SEmBHNj

Score
10/10

Malware Config

Extracted

Family

lumma

C2

https://technologyenterdo.shop/api

https://detectordiscusser.shop/api

https://turkeyunlikelyofw.shop/api

https://associationokeo.shop/api

Signatures

  • Detect ZGRat V1 1 IoCs
  • Lumma Stealer

    An infostealer written in C++ first seen in August 2022.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\tmp.exe
    "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:980
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
        PID:3888
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        2⤵
          PID:4440

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/980-0-0x00000000004F0000-0x0000000000562000-memory.dmp

        Filesize

        456KB

      • memory/980-1-0x0000000074A20000-0x00000000751D0000-memory.dmp

        Filesize

        7.7MB

      • memory/980-2-0x0000000004E10000-0x0000000004E20000-memory.dmp

        Filesize

        64KB

      • memory/980-9-0x0000000074A20000-0x00000000751D0000-memory.dmp

        Filesize

        7.7MB

      • memory/980-11-0x0000000002850000-0x0000000004850000-memory.dmp

        Filesize

        32.0MB

      • memory/980-16-0x0000000002850000-0x0000000004850000-memory.dmp

        Filesize

        32.0MB

      • memory/4440-5-0x0000000000400000-0x0000000000448000-memory.dmp

        Filesize

        288KB

      • memory/4440-10-0x0000000000400000-0x0000000000448000-memory.dmp

        Filesize

        288KB

      • memory/4440-12-0x0000000000A40000-0x0000000000A41000-memory.dmp

        Filesize

        4KB

      • memory/4440-13-0x0000000000A40000-0x0000000000A41000-memory.dmp

        Filesize

        4KB

      • memory/4440-14-0x0000000000A40000-0x0000000000A41000-memory.dmp

        Filesize

        4KB

      • memory/4440-15-0x0000000000400000-0x0000000000448000-memory.dmp

        Filesize

        288KB