Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
23-04-2024 00:34
Static task
static1
Behavioral task
behavioral1
Sample
b30d10e292f89f4d288839974f71f6b703d6d9a9ae698ea172a2b64364e77158.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral2
Sample
b30d10e292f89f4d288839974f71f6b703d6d9a9ae698ea172a2b64364e77158.exe
Resource
win11-20240412-en
General
-
Target
b30d10e292f89f4d288839974f71f6b703d6d9a9ae698ea172a2b64364e77158.exe
-
Size
460KB
-
MD5
b22521fb370921bb5d69bf8deecce59e
-
SHA1
3d4486b206e8aaac14a3cf201c5ac152a2a7d4ea
-
SHA256
b30d10e292f89f4d288839974f71f6b703d6d9a9ae698ea172a2b64364e77158
-
SHA512
1f7d64ba5266314ed18f577f0984706c21f4f48e8cdb069130e4435c2bcdf219f8dd27e4d3bf3a373f4db4c01e30efe8d7f4d87f4d8cbbbeaf9c7043f685994c
-
SSDEEP
12288:dxFiggCdJqiuBD2wxLdCGZeJqld72RJ7/SB0UkUmpG:588Iiu8eLYm0qld6kBRRqG
Malware Config
Extracted
lumma
https://productivelookewr.shop/api
https://tolerateilusidjukl.shop/api
https://shatterbreathepsw.shop/api
https://shortsvelventysjo.shop/api
https://incredibleextedwj.shop/api
https://alcojoldwograpciw.shop/api
https://liabilitynighstjsko.shop/api
https://demonstationfukewko.shop/api
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
b30d10e292f89f4d288839974f71f6b703d6d9a9ae698ea172a2b64364e77158.exedescription pid process target process PID 4512 set thread context of 4008 4512 b30d10e292f89f4d288839974f71f6b703d6d9a9ae698ea172a2b64364e77158.exe RegAsm.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2336 4512 WerFault.exe b30d10e292f89f4d288839974f71f6b703d6d9a9ae698ea172a2b64364e77158.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
b30d10e292f89f4d288839974f71f6b703d6d9a9ae698ea172a2b64364e77158.exedescription pid process target process PID 4512 wrote to memory of 2176 4512 b30d10e292f89f4d288839974f71f6b703d6d9a9ae698ea172a2b64364e77158.exe RegAsm.exe PID 4512 wrote to memory of 2176 4512 b30d10e292f89f4d288839974f71f6b703d6d9a9ae698ea172a2b64364e77158.exe RegAsm.exe PID 4512 wrote to memory of 2176 4512 b30d10e292f89f4d288839974f71f6b703d6d9a9ae698ea172a2b64364e77158.exe RegAsm.exe PID 4512 wrote to memory of 4008 4512 b30d10e292f89f4d288839974f71f6b703d6d9a9ae698ea172a2b64364e77158.exe RegAsm.exe PID 4512 wrote to memory of 4008 4512 b30d10e292f89f4d288839974f71f6b703d6d9a9ae698ea172a2b64364e77158.exe RegAsm.exe PID 4512 wrote to memory of 4008 4512 b30d10e292f89f4d288839974f71f6b703d6d9a9ae698ea172a2b64364e77158.exe RegAsm.exe PID 4512 wrote to memory of 4008 4512 b30d10e292f89f4d288839974f71f6b703d6d9a9ae698ea172a2b64364e77158.exe RegAsm.exe PID 4512 wrote to memory of 4008 4512 b30d10e292f89f4d288839974f71f6b703d6d9a9ae698ea172a2b64364e77158.exe RegAsm.exe PID 4512 wrote to memory of 4008 4512 b30d10e292f89f4d288839974f71f6b703d6d9a9ae698ea172a2b64364e77158.exe RegAsm.exe PID 4512 wrote to memory of 4008 4512 b30d10e292f89f4d288839974f71f6b703d6d9a9ae698ea172a2b64364e77158.exe RegAsm.exe PID 4512 wrote to memory of 4008 4512 b30d10e292f89f4d288839974f71f6b703d6d9a9ae698ea172a2b64364e77158.exe RegAsm.exe PID 4512 wrote to memory of 4008 4512 b30d10e292f89f4d288839974f71f6b703d6d9a9ae698ea172a2b64364e77158.exe RegAsm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b30d10e292f89f4d288839974f71f6b703d6d9a9ae698ea172a2b64364e77158.exe"C:\Users\Admin\AppData\Local\Temp\b30d10e292f89f4d288839974f71f6b703d6d9a9ae698ea172a2b64364e77158.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:2176
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:4008
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4512 -s 3402⤵
- Program crash
PID:2336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4512 -ip 45121⤵PID:4532