Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
22-04-2024 01:47
Static task
static1
Behavioral task
behavioral1
Sample
aca438e378d0fd7abdb1fc1f7cc9acdc279dbd399fda98f8078a99a4a24e537a.exe
Resource
win7-20240221-en
General
-
Target
aca438e378d0fd7abdb1fc1f7cc9acdc279dbd399fda98f8078a99a4a24e537a.exe
-
Size
1.2MB
-
MD5
91a6507a51ddcf98f542e89c58b9a17e
-
SHA1
870a96273698fc67cf145a7601fc3892671eea22
-
SHA256
aca438e378d0fd7abdb1fc1f7cc9acdc279dbd399fda98f8078a99a4a24e537a
-
SHA512
cdc5aa3b28e69e119c1415ce760d6cd6633eb5ab98834d609ec198b212614ad49d1f9e5c11f44507522eaf7b1bf39d5d9d20064df5259a358951e15f05154e48
-
SSDEEP
24576:zkeQ/Joxh1oVZM8YWmwZ+Y3DkUU78T0KPTXBsn1F9/GAApP1aqNt+:Xxh1oVZMY31snDNrABYqS
Malware Config
Extracted
lumma
https://productivelookewr.shop/api
https://tolerateilusidjukl.shop/api
https://shatterbreathepsw.shop/api
https://shortsvelventysjo.shop/api
https://incredibleextedwj.shop/api
https://alcojoldwograpciw.shop/api
https://liabilitynighstjsko.shop/api
https://demonstationfukewko.shop/api
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
aca438e378d0fd7abdb1fc1f7cc9acdc279dbd399fda98f8078a99a4a24e537a.exedescription pid process target process PID 2964 set thread context of 1572 2964 aca438e378d0fd7abdb1fc1f7cc9acdc279dbd399fda98f8078a99a4a24e537a.exe RegAsm.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
aca438e378d0fd7abdb1fc1f7cc9acdc279dbd399fda98f8078a99a4a24e537a.exedescription pid process target process PID 2964 wrote to memory of 1552 2964 aca438e378d0fd7abdb1fc1f7cc9acdc279dbd399fda98f8078a99a4a24e537a.exe RegAsm.exe PID 2964 wrote to memory of 1552 2964 aca438e378d0fd7abdb1fc1f7cc9acdc279dbd399fda98f8078a99a4a24e537a.exe RegAsm.exe PID 2964 wrote to memory of 1552 2964 aca438e378d0fd7abdb1fc1f7cc9acdc279dbd399fda98f8078a99a4a24e537a.exe RegAsm.exe PID 2964 wrote to memory of 1572 2964 aca438e378d0fd7abdb1fc1f7cc9acdc279dbd399fda98f8078a99a4a24e537a.exe RegAsm.exe PID 2964 wrote to memory of 1572 2964 aca438e378d0fd7abdb1fc1f7cc9acdc279dbd399fda98f8078a99a4a24e537a.exe RegAsm.exe PID 2964 wrote to memory of 1572 2964 aca438e378d0fd7abdb1fc1f7cc9acdc279dbd399fda98f8078a99a4a24e537a.exe RegAsm.exe PID 2964 wrote to memory of 1572 2964 aca438e378d0fd7abdb1fc1f7cc9acdc279dbd399fda98f8078a99a4a24e537a.exe RegAsm.exe PID 2964 wrote to memory of 1572 2964 aca438e378d0fd7abdb1fc1f7cc9acdc279dbd399fda98f8078a99a4a24e537a.exe RegAsm.exe PID 2964 wrote to memory of 1572 2964 aca438e378d0fd7abdb1fc1f7cc9acdc279dbd399fda98f8078a99a4a24e537a.exe RegAsm.exe PID 2964 wrote to memory of 1572 2964 aca438e378d0fd7abdb1fc1f7cc9acdc279dbd399fda98f8078a99a4a24e537a.exe RegAsm.exe PID 2964 wrote to memory of 1572 2964 aca438e378d0fd7abdb1fc1f7cc9acdc279dbd399fda98f8078a99a4a24e537a.exe RegAsm.exe PID 2964 wrote to memory of 1572 2964 aca438e378d0fd7abdb1fc1f7cc9acdc279dbd399fda98f8078a99a4a24e537a.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aca438e378d0fd7abdb1fc1f7cc9acdc279dbd399fda98f8078a99a4a24e537a.exe"C:\Users\Admin\AppData\Local\Temp\aca438e378d0fd7abdb1fc1f7cc9acdc279dbd399fda98f8078a99a4a24e537a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:1552
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:1572
-