Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21-04-2024 02:15
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240221-en
General
-
Target
file.exe
-
Size
5.9MB
-
MD5
817c11005ca185252e666c25769a2591
-
SHA1
e52ec29d0e10c63b378b919fa1f5839b714be07c
-
SHA256
353ed3726f653a8e19c5c1511088ae21f3673d992a1781c100dec7e8418a7fc8
-
SHA512
b7cb060c4cabbb926e8a40adf797f9b082f6bac87a97b984aa6a636d82cf873b5657026b43d17359ffa1cee1f9eacced591f6c03e747b3d63090a4bc3d0fbf9b
-
SSDEEP
49152:W/Ce4+1N237v0gM68DXYDqwLvws0EdRGtVpT1kTNkbNbQWSxR9DzNJyEv5j/ujOJ:je4PLs6VKOQpyJWSxR9vBEAm8dJT1
Malware Config
Extracted
lumma
https://stripmarrystresew.shop/api
https://entitlementappwo.shop/api
https://economicscreateojsu.shop/api
https://pushjellysingeywus.shop/api
https://absentconvicsjawun.shop/api
https://suitcaseacanehalk.shop/api
https://bordersoarmanusjuw.shop/api
https://mealplayerpreceodsju.shop/api
https://wifeplasterbakewis.shop/api
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
file.exedescription pid process target process PID 3264 set thread context of 2404 3264 file.exe BitLockerToGo.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
file.exedescription pid process target process PID 3264 wrote to memory of 2404 3264 file.exe BitLockerToGo.exe PID 3264 wrote to memory of 2404 3264 file.exe BitLockerToGo.exe PID 3264 wrote to memory of 2404 3264 file.exe BitLockerToGo.exe PID 3264 wrote to memory of 2404 3264 file.exe BitLockerToGo.exe PID 3264 wrote to memory of 2404 3264 file.exe BitLockerToGo.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵PID:2404
-