Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23-07-2024 19:35
Static task
static1
Behavioral task
behavioral1
Sample
49e5d173ca444f5f54637fea72328238.exe
Resource
win7-20240708-en
General
-
Target
49e5d173ca444f5f54637fea72328238.exe
-
Size
855KB
-
MD5
49e5d173ca444f5f54637fea72328238
-
SHA1
8222bb2340ed869f14e5a0515edce36b900ac235
-
SHA256
401412b8eedb1b25cec30b49050c7502b4add8d7008e0d97d19372b4fbdd9f23
-
SHA512
4c9a4d8b4c3c311a4e5053779cd4ce8cc118989d7ddf302d4b9e2bd11dbb06caf6957cb8412fdefbe911c8de5ef7a6371018ae6c4b08ce94b43d660f278e3e5a
-
SSDEEP
12288:0cC/Xv6TAEKTXy90WJspkG3XZt2fbhVtwRH9Z0bl11QUjDQLSwO:07Xv6UEt9vspkyZmtwUjDI
Malware Config
Extracted
lumma
https://importancedopz.shop/api
https://unseaffarignsk.shop/api
https://shepherdlyopzc.shop/api
https://upknittsoappz.shop/api
https://liernessfornicsa.shop/api
https://outpointsozp.shop/api
https://callosallsaospz.shop/api
https://lariatedzugspd.shop/api
https://indexterityszcoxp.shop/api
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 25 bitbucket.org 26 bitbucket.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1148 set thread context of 4728 1148 49e5d173ca444f5f54637fea72328238.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 49e5d173ca444f5f54637fea72328238.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winhlp32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1148 wrote to memory of 4728 1148 49e5d173ca444f5f54637fea72328238.exe 91 PID 1148 wrote to memory of 4728 1148 49e5d173ca444f5f54637fea72328238.exe 91 PID 1148 wrote to memory of 4728 1148 49e5d173ca444f5f54637fea72328238.exe 91 PID 1148 wrote to memory of 4728 1148 49e5d173ca444f5f54637fea72328238.exe 91 PID 1148 wrote to memory of 4728 1148 49e5d173ca444f5f54637fea72328238.exe 91 PID 1148 wrote to memory of 4728 1148 49e5d173ca444f5f54637fea72328238.exe 91 PID 1148 wrote to memory of 4728 1148 49e5d173ca444f5f54637fea72328238.exe 91 PID 1148 wrote to memory of 4728 1148 49e5d173ca444f5f54637fea72328238.exe 91 PID 1148 wrote to memory of 4728 1148 49e5d173ca444f5f54637fea72328238.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\49e5d173ca444f5f54637fea72328238.exe"C:\Users\Admin\AppData\Local\Temp\49e5d173ca444f5f54637fea72328238.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\winhlp32.exe"C:\Windows\winhlp32.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4728
-