Analysis
-
max time kernel
134s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2024, 19:19
Static task
static1
General
-
Target
installer.exe
-
Size
508KB
-
MD5
f1b2b392b9b42582b3319f052b927bac
-
SHA1
53c2c995aea785414372b146ecbb985a6e129aee
-
SHA256
dfe3a8253d2604e17029c16fdcd6e1b4a6af391a74c832745c861f55db0de842
-
SHA512
5b21a90d18f9204801b999ca60391fb7a3b9aa6a59911a328da906aaf7fd755dabcfe5d50d0ed2778ca2155fba01d3d6fe8f573d0311ae11b041ad7a5d264893
-
SSDEEP
12288:Z9F5yzOxwqwXONI3Y/l5+rcNG9dtA7EuPDB82:7GzLXg5/l5+r73taEuLu
Malware Config
Extracted
lumma
https://kaminiasbbefow.shop/api
Extracted
lumma
https://tenntysjuxmz.shop/api
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2432 set thread context of 4260 2432 installer.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language installer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133674456269788959" chrome.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1476 chrome.exe 1476 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe Token: SeShutdownPrivilege 1476 chrome.exe Token: SeCreatePagefilePrivilege 1476 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe 1476 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2432 wrote to memory of 4260 2432 installer.exe 90 PID 2432 wrote to memory of 4260 2432 installer.exe 90 PID 2432 wrote to memory of 4260 2432 installer.exe 90 PID 2432 wrote to memory of 4260 2432 installer.exe 90 PID 2432 wrote to memory of 4260 2432 installer.exe 90 PID 2432 wrote to memory of 4260 2432 installer.exe 90 PID 2432 wrote to memory of 4260 2432 installer.exe 90 PID 2432 wrote to memory of 4260 2432 installer.exe 90 PID 2432 wrote to memory of 4260 2432 installer.exe 90 PID 1476 wrote to memory of 4132 1476 chrome.exe 93 PID 1476 wrote to memory of 4132 1476 chrome.exe 93 PID 1476 wrote to memory of 4716 1476 chrome.exe 94 PID 1476 wrote to memory of 4716 1476 chrome.exe 94 PID 1476 wrote to memory of 4716 1476 chrome.exe 94 PID 1476 wrote to memory of 4716 1476 chrome.exe 94 PID 1476 wrote to memory of 4716 1476 chrome.exe 94 PID 1476 wrote to memory of 4716 1476 chrome.exe 94 PID 1476 wrote to memory of 4716 1476 chrome.exe 94 PID 1476 wrote to memory of 4716 1476 chrome.exe 94 PID 1476 wrote to memory of 4716 1476 chrome.exe 94 PID 1476 wrote to memory of 4716 1476 chrome.exe 94 PID 1476 wrote to memory of 4716 1476 chrome.exe 94 PID 1476 wrote to memory of 4716 1476 chrome.exe 94 PID 1476 wrote to memory of 4716 1476 chrome.exe 94 PID 1476 wrote to memory of 4716 1476 chrome.exe 94 PID 1476 wrote to memory of 4716 1476 chrome.exe 94 PID 1476 wrote to memory of 4716 1476 chrome.exe 94 PID 1476 wrote to memory of 4716 1476 chrome.exe 94 PID 1476 wrote to memory of 4716 1476 chrome.exe 94 PID 1476 wrote to memory of 4716 1476 chrome.exe 94 PID 1476 wrote to memory of 4716 1476 chrome.exe 94 PID 1476 wrote to memory of 4716 1476 chrome.exe 94 PID 1476 wrote to memory of 4716 1476 chrome.exe 94 PID 1476 wrote to memory of 4716 1476 chrome.exe 94 PID 1476 wrote to memory of 4716 1476 chrome.exe 94 PID 1476 wrote to memory of 4716 1476 chrome.exe 94 PID 1476 wrote to memory of 4716 1476 chrome.exe 94 PID 1476 wrote to memory of 4716 1476 chrome.exe 94 PID 1476 wrote to memory of 4716 1476 chrome.exe 94 PID 1476 wrote to memory of 4716 1476 chrome.exe 94 PID 1476 wrote to memory of 4716 1476 chrome.exe 94 PID 1476 wrote to memory of 3852 1476 chrome.exe 95 PID 1476 wrote to memory of 3852 1476 chrome.exe 95 PID 1476 wrote to memory of 1496 1476 chrome.exe 96 PID 1476 wrote to memory of 1496 1476 chrome.exe 96 PID 1476 wrote to memory of 1496 1476 chrome.exe 96 PID 1476 wrote to memory of 1496 1476 chrome.exe 96 PID 1476 wrote to memory of 1496 1476 chrome.exe 96 PID 1476 wrote to memory of 1496 1476 chrome.exe 96 PID 1476 wrote to memory of 1496 1476 chrome.exe 96 PID 1476 wrote to memory of 1496 1476 chrome.exe 96 PID 1476 wrote to memory of 1496 1476 chrome.exe 96 PID 1476 wrote to memory of 1496 1476 chrome.exe 96 PID 1476 wrote to memory of 1496 1476 chrome.exe 96 PID 1476 wrote to memory of 1496 1476 chrome.exe 96 PID 1476 wrote to memory of 1496 1476 chrome.exe 96 PID 1476 wrote to memory of 1496 1476 chrome.exe 96 PID 1476 wrote to memory of 1496 1476 chrome.exe 96 PID 1476 wrote to memory of 1496 1476 chrome.exe 96 PID 1476 wrote to memory of 1496 1476 chrome.exe 96 PID 1476 wrote to memory of 1496 1476 chrome.exe 96 PID 1476 wrote to memory of 1496 1476 chrome.exe 96 PID 1476 wrote to memory of 1496 1476 chrome.exe 96 PID 1476 wrote to memory of 1496 1476 chrome.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\installer.exe"C:\Users\Admin\AppData\Local\Temp\installer.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ff9fea4cc40,0x7ff9fea4cc4c,0x7ff9fea4cc582⤵PID:4132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1828,i,12810364163250082187,4565001352043357185,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1840 /prefetch:22⤵PID:4716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2056,i,12810364163250082187,4565001352043357185,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2116 /prefetch:32⤵PID:3852
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1704,i,12810364163250082187,4565001352043357185,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2396 /prefetch:82⤵PID:1496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,12810364163250082187,4565001352043357185,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:2624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3288,i,12810364163250082187,4565001352043357185,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4576,i,12810364163250082187,4565001352043357185,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4512 /prefetch:12⤵PID:4892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4808,i,12810364163250082187,4565001352043357185,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4832 /prefetch:82⤵PID:632
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4972,i,12810364163250082187,4565001352043357185,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4872 /prefetch:82⤵PID:2680
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1700
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56fc68ce8b96658fa1d8af35359524027
SHA1275b4628bdac030b62db5fe984642cde0bfa9a30
SHA2560b2a9054e6ec7ad036646751649eb4c798a21cfbd3c4b0ed88c224b428c50fd4
SHA512d6c516d88e765a2a7e571eaa9719de82334ff99cc044d3f77484584539bfd8f73d33e4ee0826eb1145864642c9adfe07f672ad61ac1f5aef17e17b645c24751f
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD502c2a724696f4aae6d6abf4e4fc4eac5
SHA15689c69eac7d2a6b5b2ae03a31e0a8cc2c82b29e
SHA2568b6dc6142940491d31a0336f03cae6bf1daabad99d95d101d6be227a20e521d4
SHA512255b7f0232079ef1c2d69ea8e22429a0cd6476c710707780e5257a723df78f2163650ba1db8dee03d42693a757974fbebfed81615c3a5f353be6861165d92850
-
Filesize
8KB
MD5ca7763a752c9f02ee9ef743ae3b9a78c
SHA1ab9836f786b0f6b40b16198dabe69248e4e8ad4b
SHA2560836f17e2d41e12b2b2c3edde494bf2bf0f5cfbffb3ae60840d68d6a5ef9a5d0
SHA512d93b05048f831ba42d166b0891eddd91bd9cf76b4a5a95dd9e3c9742b2345cfb23f2aa395625b5e8b9459558fc65eedd4bcb7e768f9579411996b1f370df36a1
-
Filesize
15KB
MD511c0846c2f306e298318b6addbe97547
SHA10eea06a59f1c593f714722b00e6853ad72f4604e
SHA25614fe9ede7dee615ea650fde441bba6673446186e1e04fc3b9e6c95f13e6c8934
SHA512bda14dc56a91b2f9576bb08735d710d8048074438a7958f7c97c9ac36e61a7a5dfac666b888c93dcb21d0338f60d049af563889de597f34ecc498c5b1a99b6fb
-
Filesize
193KB
MD5158123d5453c40a459395631a275c225
SHA1ed6c651cf1c0483990f773129707300d1727ce97
SHA256c3cb0802a922bc7359c54ee6dc46256fe9e402858a1c086a2321aac3a92e3c64
SHA5122d7d057094745ed8ef9eb38756654d16309f5470f33de6e90d8927f18adbef8c6bd3e297f9fcc3fb6721a2263e18216bb58f2fd74695eb5760980b892fe3c84b
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58