Analysis
-
max time kernel
143s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21-04-2024 06:01
Static task
static1
Behavioral task
behavioral1
Sample
@#!!New_SoftWare_2024_ṔḁṨṨCṏḌḙ#$.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
@#!!New_SoftWare_2024_ṔḁṨṨCṏḌḙ#$.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
@#!!New_SoftWare_2024_ṔḁṨṨCṏḌḙ#$.exe
Resource
win11-20240412-en
General
-
Target
@#!!New_SoftWare_2024_ṔḁṨṨCṏḌḙ#$.exe
-
Size
3.5MB
-
MD5
f3926079722ea980ed43703b7e56c578
-
SHA1
c91f413aaed6a2c97cef6ceea4b821faabe35994
-
SHA256
19cf5c9f250d27c1ff53f81a0ebad37428ca71a2647e358c8b3f2bfda102a8ef
-
SHA512
9157bab3d721fbe835250a2b864f7a8ea2a3b4e9e21bc527ca08589bd90446e887fc6797554157419a2efa2466ee30e6171746ee0e71ccfa224395ea33fa7828
-
SSDEEP
98304:ZYnY0iuf1ZByTLpwiaOZu2u3YP21sr7wx4oDIouiIOiUq:ZYnLI1witJu3A5wCoehH3
Malware Config
Extracted
lumma
https://harassretunrstiwo.shop/api
https://productivelookewr.shop/api
https://tolerateilusidjukl.shop/api
https://shatterbreathepsw.shop/api
https://shortsvelventysjo.shop/api
https://incredibleextedwj.shop/api
https://alcojoldwograpciw.shop/api
https://liabilitynighstjsko.shop/api
https://demonstationfukewko.shop/api
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
@#!!New_SoftWare_2024_ṔḁṨṨCṏḌḙ#$.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-259785868-298165991-4178590326-1000\Control Panel\International\Geo\Nation @#!!New_SoftWare_2024_ṔḁṨṨCṏḌḙ#$.exe -
Executes dropped EXE 1 IoCs
Processes:
Setup.exepid process 4524 Setup.exe -
Loads dropped DLL 3 IoCs
Processes:
Setup.exetracewpp.exepid process 4524 Setup.exe 4524 Setup.exe 1620 tracewpp.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Setup.exedescription pid process target process PID 4524 set thread context of 2716 4524 Setup.exe netsh.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
Setup.exenetsh.exepid process 4524 Setup.exe 4524 Setup.exe 2716 netsh.exe 2716 netsh.exe 2716 netsh.exe 2716 netsh.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
Setup.exenetsh.exepid process 4524 Setup.exe 2716 netsh.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
@#!!New_SoftWare_2024_ṔḁṨṨCṏḌḙ#$.exeSetup.exenetsh.exedescription pid process target process PID 3396 wrote to memory of 4524 3396 @#!!New_SoftWare_2024_ṔḁṨṨCṏḌḙ#$.exe Setup.exe PID 3396 wrote to memory of 4524 3396 @#!!New_SoftWare_2024_ṔḁṨṨCṏḌḙ#$.exe Setup.exe PID 4524 wrote to memory of 2716 4524 Setup.exe netsh.exe PID 4524 wrote to memory of 2716 4524 Setup.exe netsh.exe PID 4524 wrote to memory of 2716 4524 Setup.exe netsh.exe PID 4524 wrote to memory of 2716 4524 Setup.exe netsh.exe PID 2716 wrote to memory of 1620 2716 netsh.exe tracewpp.exe PID 2716 wrote to memory of 1620 2716 netsh.exe tracewpp.exe PID 2716 wrote to memory of 1620 2716 netsh.exe tracewpp.exe PID 2716 wrote to memory of 1620 2716 netsh.exe tracewpp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\@#!!New_SoftWare_2024_ṔḁṨṨCṏḌḙ#$.exe"C:\Users\Admin\AppData\Local\Temp\@#!!New_SoftWare_2024_ṔḁṨṨCṏḌḙ#$.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\SysWOW64\netsh.exeC:\Windows\SysWOW64\netsh.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\tracewpp.exeC:\Users\Admin\AppData\Local\Temp\tracewpp.exe4⤵
- Loads dropped DLL
PID:1620
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5800dd9f87b348ad2be9b926d054013c9
SHA1adc39077317b97e4033b982cc3ac0471c2c0e6e2
SHA256101dcf7b0cab79681d9e3c63413b2d700ca79f2bc570faee703c9dbfff1176ba
SHA512fcc4a58a5d569a9561553c1f0fa8b978df89bdfc88baa5d04e1fc499b7b8ab91a855580d86a51f51af4540edf6a4e5977a224b1cc91986e06e057ed0dd841bfc
-
Filesize
94KB
MD59a4cc0d8e7007f7ef20ca585324e0739
SHA1f3e5a2e477cac4bab85940a2158eed78f2d74441
SHA256040d121a3179f49cd3f33f4bc998bc8f78b7f560bfd93f279224d69e76a06e92
SHA51254636a48141804112f5b4f2fc70cb7c959a041e5743aeedb5184091b51daa1d1a03f0016e8299c0d56d924c6c8ae585e4fc864021081ffdf1e6f3eab11dd43b3
-
Filesize
106KB
MD549c96cecda5c6c660a107d378fdfc3d4
SHA100149b7a66723e3f0310f139489fe172f818ca8e
SHA25669320f278d90efaaeb67e2a1b55e5b0543883125834c812c8d9c39676e0494fc
SHA512e09e072f3095379b0c921d41d6e64f4f1cd78400594a2317cfb5e5dca03dedb5a8239ed89905c9e967d1acb376b0585a35addf6648422c7ddb472ce38b1ba60d
-
Filesize
915KB
MD51d070b44d4cfa45325bf3b89168921c5
SHA162f1aa9e982bb4ca3dc7d93dbb784fb2ca57751f
SHA2569e35a20dfe967b3999761df98dea750ba5516214e3d91086d3f1a422ac4ff982
SHA51243372cc3b20693052cb6dbb98a5c1fc3635a69ee11262e3334bbbb05c84c892f165d6bdbe0eb61b83b3297c48a13a60a22741bdc4795b131c8d25297b135e5ae
-
Filesize
73KB
MD55a055f819fd0c3454e0d90507dc25257
SHA127e8af7782f080e8ea3c06cb31ddbfa768cb127b
SHA2560566fbe3e0e3f35083ebf4304b581e03cf4eccb37da57f7c7a4bdcf6f2e2c3d8
SHA5121a48f170895be20d6e4b3eb2c125b404376158f471cb29a2d474824457668dbaa07261049f61cad68fc341fac011e0170e8eb54aae8b10a6456ed6d910a5842d
-
Filesize
4.3MB
MD5fc90f16df2e942d04add02e705ba9bcc
SHA1a64997c424e6d28a2e47c347c7ae9a37073b727d
SHA2565aa78fb7130326cc0a37cbc04854df22f890f7692e27747dbc88cf81f62ea157
SHA5126d058416def68a7e642e679e5d42348d47b3e9c6ccbff84827b8c1bb0e076525e4b3c24b7577455ed1d83a8f3a6602ee248afd35f8463396043ac6cd183a82e6
-
Filesize
207KB
MD50930890f83efad2a3091d1e3f0b82707
SHA1e0dcdefdde9dddd482e0b72504b35e96b795b27e
SHA256e8be7f038dd98179a1a27d5b176d23a60ad44426442699a3b9b714f9778c5cf2
SHA512608e2a169a9eb3c1b8e4459704e87123e5d04de57937175811a3f67559f0ead77b09e48562c1df732552a6aca7a8089528f43cda83bcdad1644a089b11a0e9f6