Overview
overview
10Static
static
30dfc7afcaa...c4.exe
windows7-x64
30dfc7afcaa...c4.exe
windows10-2004-x64
10104ab96ec5...91.exe
windows10-2004-x64
10150d5d207f...74.exe
windows10-2004-x64
1019408d20ed...1b.exe
windows7-x64
319408d20ed...1b.exe
windows10-2004-x64
10209f361ec5...19.exe
windows7-x64
3209f361ec5...19.exe
windows10-2004-x64
1032df5b0360...59.exe
windows10-2004-x64
105a9212ccca...d1.exe
windows10-2004-x64
106547f1c95b...de.exe
windows10-2004-x64
1071abd07878...2a.exe
windows7-x64
371abd07878...2a.exe
windows10-2004-x64
107d7131e841...77.exe
windows10-2004-x64
10981d198e1d...05.exe
windows7-x64
3981d198e1d...05.exe
windows10-2004-x64
109be0387d86...b9.exe
windows10-2004-x64
109d44150fdc...7d.exe
windows10-2004-x64
6b7da28873d...d0.exe
windows10-2004-x64
10c6bd926d58...44.exe
windows10-2004-x64
10d599ef82af...3c.exe
windows10-2004-x64
10db2419395b...f8.exe
windows10-2004-x64
10e7b8d2cb79...0b.exe
windows10-2004-x64
10eeebcd7da8...f5.exe
windows10-2004-x64
10f1ae7fab47...cc.exe
windows10-2004-x64
10Analysis
-
max time kernel
92s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
10-05-2024 14:35
Static task
static1
Behavioral task
behavioral1
Sample
0dfc7afcaa9349ea50b58920f20c7af6071f07f3aba206d96b30716dd61b95c4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0dfc7afcaa9349ea50b58920f20c7af6071f07f3aba206d96b30716dd61b95c4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
104ab96ec5c48fc27c7e1536ff21081aa1efc5fcfdb8ff48716f9c44afbda891.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
150d5d207fadbb612a41c8c9dae6ffe50c8cffd2db96a1cb75a5c779cbd82974.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
19408d20edf49736ff3e86b9c52dcd2bf4b3da61eff72888392b2de04e27351b.exe
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
19408d20edf49736ff3e86b9c52dcd2bf4b3da61eff72888392b2de04e27351b.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
209f361ec54d3eb7e8c1324ecea4c86835a53f08014f20d8acdb405a98c70e19.exe
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
209f361ec54d3eb7e8c1324ecea4c86835a53f08014f20d8acdb405a98c70e19.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
32df5b0360337fb2cb7c64f82fa3d8fde28ff3c1028c424475918553f0dae959.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
5a9212ccca92111e18358da4163f1a5d4c12debc5b1d9ac429198c7ad68de5d1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
6547f1c95bc0b060cd5e5f6b8e5e968b730cd21f758f6dd5371e802b13a5a1de.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
71abd07878fba4bfa822c83c9dd023f4bafbeedcce63770fad08edb14d06fd2a.exe
Resource
win7-20240508-en
Behavioral task
behavioral13
Sample
71abd07878fba4bfa822c83c9dd023f4bafbeedcce63770fad08edb14d06fd2a.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral14
Sample
7d7131e8413b3c93cdef92a3c5fc4874d5c98935874642f451bb7fa887f9ac77.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
981d198e1de125ce89beae1c0930fc2c9f513d88c9048e0d41c6f12c41ab0e05.exe
Resource
win7-20240220-en
Behavioral task
behavioral16
Sample
981d198e1de125ce89beae1c0930fc2c9f513d88c9048e0d41c6f12c41ab0e05.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
9be0387d865bef272b66fe34363fa38f5c4e2be5b6b773526bfc1d14b4791eb9.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral18
Sample
9d44150fdc90939c6efc8d7882f0d89238b77267f40bd7b9e9fdff66d41f587d.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
b7da28873d43a4b6acac44b82b109a2489323a219d2cece98db41b834a2f30d0.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral20
Sample
c6bd926d58aa119662ccfb970124884439404950b8aa818378fa47a61a658a44.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
d599ef82af0badf49dd8c6cc5d7bad517685798e47a31291d482c5768dae4e3c.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral22
Sample
db2419395b2091b54fbda644944d811a11fcb035dba5ab2e6d4b5ee327abbdf8.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
e7b8d2cb79d76cc4434f9525644c524179ad84cea43f8c12ee7ad387710dfc0b.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral24
Sample
eeebcd7da83427c994c4399d2aeda8161beb9d76926f8245160789de2d6613f5.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
f1ae7fab47b54b57b64fe4b0569d28421b914cc77c243cf2d59a0645d15e8ecc.exe
Resource
win10v2004-20240426-en
General
-
Target
0dfc7afcaa9349ea50b58920f20c7af6071f07f3aba206d96b30716dd61b95c4.exe
-
Size
537KB
-
MD5
b2a8d89ff748f4bd5fc18ae429c2868a
-
SHA1
073223ab6c0eece379bfe739bd998da924da9e6c
-
SHA256
0dfc7afcaa9349ea50b58920f20c7af6071f07f3aba206d96b30716dd61b95c4
-
SHA512
15fe353ecad3bb37f4dce11aaa81e41eeb1ec219c11e465efd5338fea53fef976fde9edebdb0eee96fe78f25235af0cefcc58050b7bb8c21d2bd9c1c53a4cb5e
-
SSDEEP
12288:BJgGeX0H4pTsQ+ygfjIWX4d4+W8V3dJZMIoyQG5bDan0Xp:BJgmH4SpIWxIJZxolGa0
Malware Config
Extracted
lumma
https://acceptabledcooeprs.shop/api
https://obsceneclassyjuwks.shop/api
https://zippyfinickysofwps.shop/api
https://miniaturefinerninewjs.shop/api
https://plaintediousidowsko.shop/api
https://sweetsquarediaslw.shop/api
https://holicisticscrarws.shop/api
https://boredimperissvieos.shop/api
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4456 set thread context of 4268 4456 0dfc7afcaa9349ea50b58920f20c7af6071f07f3aba206d96b30716dd61b95c4.exe 83 -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4456 wrote to memory of 4268 4456 0dfc7afcaa9349ea50b58920f20c7af6071f07f3aba206d96b30716dd61b95c4.exe 83 PID 4456 wrote to memory of 4268 4456 0dfc7afcaa9349ea50b58920f20c7af6071f07f3aba206d96b30716dd61b95c4.exe 83 PID 4456 wrote to memory of 4268 4456 0dfc7afcaa9349ea50b58920f20c7af6071f07f3aba206d96b30716dd61b95c4.exe 83 PID 4456 wrote to memory of 4268 4456 0dfc7afcaa9349ea50b58920f20c7af6071f07f3aba206d96b30716dd61b95c4.exe 83 PID 4456 wrote to memory of 4268 4456 0dfc7afcaa9349ea50b58920f20c7af6071f07f3aba206d96b30716dd61b95c4.exe 83 PID 4456 wrote to memory of 4268 4456 0dfc7afcaa9349ea50b58920f20c7af6071f07f3aba206d96b30716dd61b95c4.exe 83 PID 4456 wrote to memory of 4268 4456 0dfc7afcaa9349ea50b58920f20c7af6071f07f3aba206d96b30716dd61b95c4.exe 83 PID 4456 wrote to memory of 4268 4456 0dfc7afcaa9349ea50b58920f20c7af6071f07f3aba206d96b30716dd61b95c4.exe 83 PID 4456 wrote to memory of 4268 4456 0dfc7afcaa9349ea50b58920f20c7af6071f07f3aba206d96b30716dd61b95c4.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\0dfc7afcaa9349ea50b58920f20c7af6071f07f3aba206d96b30716dd61b95c4.exe"C:\Users\Admin\AppData\Local\Temp\0dfc7afcaa9349ea50b58920f20c7af6071f07f3aba206d96b30716dd61b95c4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:4268
-