Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11-03-2024 07:17
Behavioral task
behavioral1
Sample
13ba54cd51054b82cc24cb5dfbdc1256.exe
Resource
win7-20240215-en
windows7-x64
5 signatures
150 seconds
General
-
Target
13ba54cd51054b82cc24cb5dfbdc1256.exe
-
Size
3.9MB
-
MD5
13ba54cd51054b82cc24cb5dfbdc1256
-
SHA1
94ef4fad3c22b764fd6dc5a90490ca07aec25401
-
SHA256
d160705c870ec3a76eb6626440d20a0101b972149561c6f27ef5e7f0958ce1a3
-
SHA512
703141ed1a5999806810cc224c907dfef4f9570226205ba68b34d2d2334b3618bafa2a5bcb1cea012d77f2d222a23cb920c11cfc59a71e118f81fddfa5af3c8f
-
SSDEEP
98304:iuSkCqdCgvipkZezOcuNLxZOVogKAEYOe/t9nQsc4KxqzEqw:i1dqdWdzVMxonAYOeDnpc46Nt
Malware Config
Extracted
Family
lumma
C2
https://associationokeo.shop/api
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral2/memory/4224-0-0x0000000000120000-0x00000000001A6000-memory.dmp family_zgrat_v1 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4224 set thread context of 4228 4224 13ba54cd51054b82cc24cb5dfbdc1256.exe 96 -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4224 wrote to memory of 4228 4224 13ba54cd51054b82cc24cb5dfbdc1256.exe 96 PID 4224 wrote to memory of 4228 4224 13ba54cd51054b82cc24cb5dfbdc1256.exe 96 PID 4224 wrote to memory of 4228 4224 13ba54cd51054b82cc24cb5dfbdc1256.exe 96 PID 4224 wrote to memory of 4228 4224 13ba54cd51054b82cc24cb5dfbdc1256.exe 96 PID 4224 wrote to memory of 4228 4224 13ba54cd51054b82cc24cb5dfbdc1256.exe 96 PID 4224 wrote to memory of 4228 4224 13ba54cd51054b82cc24cb5dfbdc1256.exe 96 PID 4224 wrote to memory of 4228 4224 13ba54cd51054b82cc24cb5dfbdc1256.exe 96 PID 4224 wrote to memory of 4228 4224 13ba54cd51054b82cc24cb5dfbdc1256.exe 96 PID 4224 wrote to memory of 4228 4224 13ba54cd51054b82cc24cb5dfbdc1256.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\13ba54cd51054b82cc24cb5dfbdc1256.exe"C:\Users\Admin\AppData\Local\Temp\13ba54cd51054b82cc24cb5dfbdc1256.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4112 --field-trial-handle=2588,i,14229658658073991926,6938034815163866135,262144 --variations-seed-version /prefetch:81⤵PID:3472