Analysis
-
max time kernel
34s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11-07-2024 04:12
Static task
static1
Behavioral task
behavioral1
Sample
c4d25840a31471a5e633a5f15c6f0809975419694e552417d104d96cf2d7a9c1.exe
Resource
win7-20240708-en
General
-
Target
c4d25840a31471a5e633a5f15c6f0809975419694e552417d104d96cf2d7a9c1.exe
-
Size
530KB
-
MD5
6f897400c4b058b5cb0ca0d83c536af7
-
SHA1
0289f3fbdafa994270bedb527e7a776d0cbd502f
-
SHA256
c4d25840a31471a5e633a5f15c6f0809975419694e552417d104d96cf2d7a9c1
-
SHA512
1a1c7666560b37cc489bcf272a134e5f93dbbde7930674fbc1180538cdaa42d42eb49fd73cbd347fcff93c81e76776cc907d7752d68e321d6e41a312f980a3c0
-
SSDEEP
12288:rRyWcpG0Sv9+XyyqLh8Ma46jKaW2QXElgLihGMhm+R:r+pG06Au0kUl5P
Malware Config
Extracted
lumma
https://stationacutwo.shop/api
https://bouncedgowp.shop/api
https://bannngwko.shop/api
https://bargainnykwo.shop/api
https://affecthorsedpo.shop/api
https://radiationnopp.shop/api
https://answerrsdo.shop/api
https://publicitttyps.shop/api
https://benchillppwo.shop/api
https://reinforcedirectorywd.shop/api
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
c4d25840a31471a5e633a5f15c6f0809975419694e552417d104d96cf2d7a9c1.exedescription pid Process procid_target PID 4508 set thread context of 4488 4508 c4d25840a31471a5e633a5f15c6f0809975419694e552417d104d96cf2d7a9c1.exe 86 -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
c4d25840a31471a5e633a5f15c6f0809975419694e552417d104d96cf2d7a9c1.exedescription pid Process procid_target PID 4508 wrote to memory of 4488 4508 c4d25840a31471a5e633a5f15c6f0809975419694e552417d104d96cf2d7a9c1.exe 86 PID 4508 wrote to memory of 4488 4508 c4d25840a31471a5e633a5f15c6f0809975419694e552417d104d96cf2d7a9c1.exe 86 PID 4508 wrote to memory of 4488 4508 c4d25840a31471a5e633a5f15c6f0809975419694e552417d104d96cf2d7a9c1.exe 86 PID 4508 wrote to memory of 4488 4508 c4d25840a31471a5e633a5f15c6f0809975419694e552417d104d96cf2d7a9c1.exe 86 PID 4508 wrote to memory of 4488 4508 c4d25840a31471a5e633a5f15c6f0809975419694e552417d104d96cf2d7a9c1.exe 86 PID 4508 wrote to memory of 4488 4508 c4d25840a31471a5e633a5f15c6f0809975419694e552417d104d96cf2d7a9c1.exe 86 PID 4508 wrote to memory of 4488 4508 c4d25840a31471a5e633a5f15c6f0809975419694e552417d104d96cf2d7a9c1.exe 86 PID 4508 wrote to memory of 4488 4508 c4d25840a31471a5e633a5f15c6f0809975419694e552417d104d96cf2d7a9c1.exe 86 PID 4508 wrote to memory of 4488 4508 c4d25840a31471a5e633a5f15c6f0809975419694e552417d104d96cf2d7a9c1.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4d25840a31471a5e633a5f15c6f0809975419694e552417d104d96cf2d7a9c1.exe"C:\Users\Admin\AppData\Local\Temp\c4d25840a31471a5e633a5f15c6f0809975419694e552417d104d96cf2d7a9c1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:4488
-