Overview
overview
10Static
static
305a0748d48...c0.exe
windows7-x64
305a0748d48...c0.exe
windows10-2004-x64
1016b83c8926...86.exe
windows10-2004-x64
101e756c3dd2...17.exe
windows10-2004-x64
102d35abe32a...2d.exe
windows10-2004-x64
103754d1115a...68.exe
windows10-2004-x64
10489287cb76...28.exe
windows10-2004-x64
104a64601cda...bb.exe
windows10-2004-x64
104f57ecadcb...56.exe
windows10-2004-x64
10678b5c88fa...33.exe
windows10-2004-x64
106ade339142...e8.exe
windows7-x64
36ade339142...e8.exe
windows10-2004-x64
106e1ca7d8d7...d7.exe
windows10-2004-x64
107a398dd87e...55.exe
windows10-2004-x64
10806347c33e...f1.exe
windows10-2004-x64
10853890cb43...68.exe
windows10-2004-x64
1085f2f1ff9e...04.exe
windows10-2004-x64
108ea62cf585...13.exe
windows7-x64
38ea62cf585...13.exe
windows10-2004-x64
10af1379c2cb...5d.exe
windows10-2004-x64
10b22005984d...40.exe
windows10-2004-x64
10b567e2a99f...c5.exe
windows10-2004-x64
10f8896ca2a9...6f.exe
windows10-2004-x64
10Analysis
-
max time kernel
141s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-05-2024 18:26
Static task
static1
Behavioral task
behavioral1
Sample
05a0748d48b19e76e2ac6f6c7a81179bc89e5adf95615c3d3417fc86f39342c0.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
05a0748d48b19e76e2ac6f6c7a81179bc89e5adf95615c3d3417fc86f39342c0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
16b83c892688e1869a75fcf88075e1a7a0983c284c41a7ff721e23cb6b9c9f86.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
1e756c3dd2f7e40b65e81817bfdb8988cb9c718ec0f522915ca3dcd647e2f017.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
2d35abe32aaee5617d43bf1fd2ace13b082a8d22878b2f5ae8136ab65d54742d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
3754d1115a8a0a19cc2164cd88182e48f6c2435bfbbcd6af4c63cc5dc0d61e68.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
489287cb76171eb013ef8276977586b53061bbfae58f0a22402bd5aa83ff8d28.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral8
Sample
4a64601cda22ee78c5a65b16c6140cd47a27949c9b5b09685526fa936b55c3bb.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
4f57ecadcb01211787f5486a7230a8018a0f8a85dfe1ad7b633beb40126c1c56.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
678b5c88fa07f2f823b7edf52683e4214bda0273e380b7a5d2d8c4b6bac35f33.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
6ade339142b77016063402bfde9702b7b9bb644452bae38929035daf779beae8.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
6ade339142b77016063402bfde9702b7b9bb644452bae38929035daf779beae8.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
6e1ca7d8d7a0c42eccbd5723dfdd5c856c5bb683313ec6d6d042d9ba90afced7.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
7a398dd87e73b31bd02e99eea6ac42ac6c884f0fed02dcf0a0a2184a33913555.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
806347c33e4007046137819a7a108692563d6b877051ff1016faf9a47ec660f1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral16
Sample
853890cb435781965f3dc9618397058d03c8d3e59706ede7d308b4afe12cbe68.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
85f2f1ff9ebbc00b11310cb6b89768dcf0eb2032b0a64810fc24c9ec9b4a6804.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
8ea62cf58512d2544c0f66fbf28e12c7a8344d4a08e8256c968a35de58ccc513.exe
Resource
win7-20240221-en
Behavioral task
behavioral19
Sample
8ea62cf58512d2544c0f66fbf28e12c7a8344d4a08e8256c968a35de58ccc513.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral20
Sample
af1379c2cbc8abd767e205c1b0a8be9e9c8b5765083700eb3fd2313bf3a76e5d.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
b22005984d343fd352d0b9067646db68950aebfa2c1e0d33b05276c602f98e40.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral22
Sample
b567e2a99fadbe5df72750afd38b655036141fe91ab1982084901d6855e1c6c5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
f8896ca2a901da194a2479237a084ee46b329ef65d0a6795eb3717cbbacb106f.exe
Resource
win10v2004-20240508-en
General
-
Target
8ea62cf58512d2544c0f66fbf28e12c7a8344d4a08e8256c968a35de58ccc513.exe
-
Size
498KB
-
MD5
4bcbf97b45320fd1995037b5c2fda8ba
-
SHA1
e5d82af83ef9875c435942d34f79d92a62a65672
-
SHA256
8ea62cf58512d2544c0f66fbf28e12c7a8344d4a08e8256c968a35de58ccc513
-
SHA512
c4ae95de3e086442b19c01b18cb8e9ee12aecff5f2a2f3b96c55f1d95ebe871967f7445e364078209d3a0947805aea492459d2586bf9ab453e11d0cc90f76f26
-
SSDEEP
12288:p9I+5gSN27L4AhsAXjl7p8d0oDrVR583JNPamoCe:I+5/NQx2YRpfoNiJNSPR
Malware Config
Extracted
lumma
https://productivelookewr.shop/api
https://tolerateilusidjukl.shop/api
https://shatterbreathepsw.shop/api
https://shortsvelventysjo.shop/api
https://incredibleextedwj.shop/api
https://alcojoldwograpciw.shop/api
https://liabilitynighstjsko.shop/api
https://demonstationfukewko.shop/api
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4752 set thread context of 1368 4752 8ea62cf58512d2544c0f66fbf28e12c7a8344d4a08e8256c968a35de58ccc513.exe 90 -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4752 wrote to memory of 1368 4752 8ea62cf58512d2544c0f66fbf28e12c7a8344d4a08e8256c968a35de58ccc513.exe 90 PID 4752 wrote to memory of 1368 4752 8ea62cf58512d2544c0f66fbf28e12c7a8344d4a08e8256c968a35de58ccc513.exe 90 PID 4752 wrote to memory of 1368 4752 8ea62cf58512d2544c0f66fbf28e12c7a8344d4a08e8256c968a35de58ccc513.exe 90 PID 4752 wrote to memory of 1368 4752 8ea62cf58512d2544c0f66fbf28e12c7a8344d4a08e8256c968a35de58ccc513.exe 90 PID 4752 wrote to memory of 1368 4752 8ea62cf58512d2544c0f66fbf28e12c7a8344d4a08e8256c968a35de58ccc513.exe 90 PID 4752 wrote to memory of 1368 4752 8ea62cf58512d2544c0f66fbf28e12c7a8344d4a08e8256c968a35de58ccc513.exe 90 PID 4752 wrote to memory of 1368 4752 8ea62cf58512d2544c0f66fbf28e12c7a8344d4a08e8256c968a35de58ccc513.exe 90 PID 4752 wrote to memory of 1368 4752 8ea62cf58512d2544c0f66fbf28e12c7a8344d4a08e8256c968a35de58ccc513.exe 90 PID 4752 wrote to memory of 1368 4752 8ea62cf58512d2544c0f66fbf28e12c7a8344d4a08e8256c968a35de58ccc513.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ea62cf58512d2544c0f66fbf28e12c7a8344d4a08e8256c968a35de58ccc513.exe"C:\Users\Admin\AppData\Local\Temp\8ea62cf58512d2544c0f66fbf28e12c7a8344d4a08e8256c968a35de58ccc513.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:1368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3808 --field-trial-handle=2264,i,15001568551143786084,90255922961447677,262144 --variations-seed-version /prefetch:81⤵PID:3644