Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
20-04-2024 17:20
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240215-en
General
-
Target
file.exe
-
Size
5.5MB
-
MD5
0b4ad1c3b3f364c3d79fabdb47fe3385
-
SHA1
85de5462d6342f03eaf3fb48176615fa6fa18508
-
SHA256
21f247c6c84b114525d41500d54a63ab4bcea96d14ba8ca13be445acd72a081d
-
SHA512
c9f6ecb99786613113ae5e02bf9e4a00fcf7036a1bddd07c87f8cb66ce8f45b9515d4fc0321cbf20282556f16645818249d04390335f518afdc1d2253f8dab76
-
SSDEEP
98304:ao3n7Qvg+PVALF8Ka+EQLkVBbrxkKmrMP2tOmzprZOCgNYWxMuxee4F6OzU7+bgb:aY84EALF8Ka+EUakLrMP2tDrQCg6Wxj5
Malware Config
Extracted
lumma
https://greetclassifytalk.shop/api
https://productivelookewr.shop/api
https://tolerateilusidjukl.shop/api
https://shatterbreathepsw.shop/api
https://shortsvelventysjo.shop/api
https://incredibleextedwj.shop/api
https://alcojoldwograpciw.shop/api
https://liabilitynighstjsko.shop/api
https://demonstationfukewko.shop/api
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3824-1-0x0000000000470000-0x0000000000D66000-memory.dmp vmprotect behavioral2/memory/3824-2-0x0000000000470000-0x0000000000D66000-memory.dmp vmprotect behavioral2/memory/3824-4-0x0000000000470000-0x0000000000D66000-memory.dmp vmprotect -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
file.exepid process 3824 file.exe 3824 file.exe