Analysis Overview
SHA256
d23a10b3ff0c565ea8ee7f54bcded0582e1e621ebad69d4523d6746f6d8e0e65
Threat Level: Known bad
The file d23a10b3ff0c565ea8ee7f54bcded0582e1e621ebad69d4523d6746f6d8e0e65 was found to be: Known bad.
Malicious Activity Summary
Lumma Stealer
Suspicious use of SetThreadContext
Unsigned PE
Program crash
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2024-05-27 02:10
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-05-27 02:10
Reported
2024-05-27 02:12
Platform
win10v2004-20240508-en
Max time kernel
131s
Max time network
101s
Command Line
Signatures
Lumma Stealer
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 3192 set thread context of 3712 | N/A | C:\Users\Admin\AppData\Local\Temp\d23a10b3ff0c565ea8ee7f54bcded0582e1e621ebad69d4523d6746f6d8e0e65.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\d23a10b3ff0c565ea8ee7f54bcded0582e1e621ebad69d4523d6746f6d8e0e65.exe |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\d23a10b3ff0c565ea8ee7f54bcded0582e1e621ebad69d4523d6746f6d8e0e65.exe
"C:\Users\Admin\AppData\Local\Temp\d23a10b3ff0c565ea8ee7f54bcded0582e1e621ebad69d4523d6746f6d8e0e65.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3192 -ip 3192
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3192 -s 284
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | detailbaconroollyws.shop | udp |
| US | 104.21.76.102:443 | detailbaconroollyws.shop | tcp |
| US | 8.8.8.8:53 | horsedwollfedrwos.shop | udp |
| US | 8.8.8.8:53 | 133.211.185.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 102.76.21.104.in-addr.arpa | udp |
| US | 172.67.157.243:443 | horsedwollfedrwos.shop | tcp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 8.8.8.8:53 | 71.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 243.157.67.172.in-addr.arpa | udp |
| US | 204.79.197.237:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | patternapplauderw.shop | udp |
| US | 104.21.55.248:443 | patternapplauderw.shop | tcp |
| US | 8.8.8.8:53 | understanndtytonyguw.shop | udp |
| US | 104.21.22.94:443 | understanndtytonyguw.shop | tcp |
| US | 8.8.8.8:53 | considerrycurrentyws.shop | udp |
| US | 172.67.170.57:443 | considerrycurrentyws.shop | tcp |
| US | 8.8.8.8:53 | 237.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 248.55.21.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 94.22.21.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | messtimetabledkolvk.shop | udp |
| US | 172.67.158.30:443 | messtimetabledkolvk.shop | tcp |
| US | 8.8.8.8:53 | deprivedrinkyfaiir.shop | udp |
| US | 172.67.134.244:443 | deprivedrinkyfaiir.shop | tcp |
| US | 8.8.8.8:53 | relaxtionflouwerwi.shop | udp |
| US | 172.67.190.237:443 | relaxtionflouwerwi.shop | tcp |
| US | 8.8.8.8:53 | 57.170.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 30.158.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 244.134.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 237.190.67.172.in-addr.arpa | udp |
| NL | 23.62.61.97:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 97.61.62.23.in-addr.arpa | udp |
| NL | 23.62.61.97:443 | www.bing.com | tcp |
| US | 8.8.8.8:53 | 183.142.211.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 228.249.119.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 26.165.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 198.187.3.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| US | 52.111.229.48:443 | tcp | |
| US | 8.8.8.8:53 | 43.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
| US | 204.79.197.200:443 | tse1.mm.bing.net | tcp |
Files
memory/3192-0-0x0000000000DD0000-0x0000000000DD1000-memory.dmp
memory/3192-2-0x0000000000DD0000-0x0000000000DD1000-memory.dmp
memory/3712-1-0x0000000000400000-0x0000000000459000-memory.dmp
memory/3712-4-0x0000000000400000-0x0000000000459000-memory.dmp
memory/3712-5-0x0000000000400000-0x0000000000459000-memory.dmp
memory/3712-6-0x0000000000400000-0x0000000000459000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-05-27 02:10
Reported
2024-05-27 02:12
Platform
win11-20240419-en
Max time kernel
91s
Max time network
95s
Command Line
Signatures
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 3908 set thread context of 4672 | N/A | C:\Users\Admin\AppData\Local\Temp\d23a10b3ff0c565ea8ee7f54bcded0582e1e621ebad69d4523d6746f6d8e0e65.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe |
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Users\Admin\AppData\Local\Temp\d23a10b3ff0c565ea8ee7f54bcded0582e1e621ebad69d4523d6746f6d8e0e65.exe |
Suspicious use of WriteProcessMemory
Processes
C:\Users\Admin\AppData\Local\Temp\d23a10b3ff0c565ea8ee7f54bcded0582e1e621ebad69d4523d6746f6d8e0e65.exe
"C:\Users\Admin\AppData\Local\Temp\d23a10b3ff0c565ea8ee7f54bcded0582e1e621ebad69d4523d6746f6d8e0e65.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3908 -ip 3908
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3908 -s 288
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | detailbaconroollyws.shop | udp |
| US | 104.21.76.102:443 | detailbaconroollyws.shop | tcp |
| US | 8.8.8.8:53 | horsedwollfedrwos.shop | udp |
| US | 104.21.74.118:443 | horsedwollfedrwos.shop | tcp |
| US | 104.21.55.248:443 | patternapplauderw.shop | tcp |
| US | 172.67.203.201:443 | understanndtytonyguw.shop | tcp |
| US | 104.21.28.32:443 | considerrycurrentyws.shop | tcp |
| US | 172.67.158.30:443 | messtimetabledkolvk.shop | tcp |
| US | 8.8.8.8:53 | 102.76.21.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 118.74.21.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 248.55.21.104.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 201.203.67.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 32.28.21.104.in-addr.arpa | udp |
| US | 172.67.134.244:443 | deprivedrinkyfaiir.shop | tcp |
| US | 104.21.76.64:443 | relaxtionflouwerwi.shop | tcp |
Files
memory/3908-0-0x0000000000B70000-0x0000000000B71000-memory.dmp
memory/3908-1-0x0000000000B70000-0x0000000000B71000-memory.dmp
memory/4672-2-0x0000000000400000-0x0000000000459000-memory.dmp
memory/3908-3-0x0000000000B70000-0x0000000000B71000-memory.dmp
memory/4672-6-0x0000000000400000-0x0000000000459000-memory.dmp
memory/4672-5-0x0000000000400000-0x0000000000459000-memory.dmp