Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 20:50
Static task
static1
Behavioral task
behavioral1
Sample
Globalhts.exe
Resource
win7-20240705-en
General
-
Target
Globalhts.exe
-
Size
14.6MB
-
MD5
0b62676466b00d579c8d0066cc05b5f3
-
SHA1
f6b9632026c0a38354e493eeb647d4da3c831234
-
SHA256
34b36c2fbb7c76464ebd2667b8c478e2e0afb3f93d16f1b68148800bf928fafd
-
SHA512
4a914df1e5cad61d2fafdd8c77bd90ec4c73d1fc44b63e2b09d8ff3d2f813f69b850060094f513e333e3c252c0d140ef5619847bcbbe901e15cdd9d3bdac4ee5
-
SSDEEP
98304:QMW3sASXhO+rag9YinX6rGHkVtFkdErwwSKcHODpnnP:/XhO+rL3qygkOrw4tDpn
Malware Config
Extracted
lumma
https://toughsnxcmxz.shop/api
https://applyzxcksdia.shop/api
https://replacedoxcjzp.shop/api
https://declaredczxi.shop/api
https://catchddkxozvp.shop/api
https://arriveoxpzxo.shop/api
https://contemplateodszsv.shop/api
https://bindceasdiwozx.shop/api
https://conformfucdioz.shop/api
Extracted
lumma
https://toughsnxcmxz.shop/api
https://tenntysjuxmz.shop/api
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3632 set thread context of 3020 3632 Globalhts.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3632 wrote to memory of 3020 3632 Globalhts.exe 89 PID 3632 wrote to memory of 3020 3632 Globalhts.exe 89 PID 3632 wrote to memory of 3020 3632 Globalhts.exe 89 PID 3632 wrote to memory of 3020 3632 Globalhts.exe 89 PID 3632 wrote to memory of 3020 3632 Globalhts.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\Globalhts.exe"C:\Users\Admin\AppData\Local\Temp\Globalhts.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵
- System Location Discovery: System Language Discovery
PID:3020
-