Analysis
-
max time kernel
76s -
max time network
78s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
10/08/2024, 16:35
Static task
static1
Behavioral task
behavioral1
Sample
7H8but7H6QRKvukmMR4kRGgs.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7H8but7H6QRKvukmMR4kRGgs.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
7H8but7H6QRKvukmMR4kRGgs.exe
Resource
win10v2004-20240802-en
General
-
Target
7H8but7H6QRKvukmMR4kRGgs.exe
-
Size
7.2MB
-
MD5
c096091896176545bc3aac5adb5f7aad
-
SHA1
d545971a44c2615f6e93e1e77fddd950a6ee773c
-
SHA256
b57280ff29b1bae4436d9f87cb929b1507831d2c91021945da5a66a001f58dfd
-
SHA512
231686d0678049c69eff7106a1a9d02b3321e209237eb777618bfa8403764f3464105b177a5d9bb3872b85fdfe2ea9affd631b925eb2552f0cba0443670ca3d8
-
SSDEEP
196608:PpyjvqOnGGXy+jPww/99k2xLjrvWAeD6HKM9wG:Pp09nGGt8w/99xxLj3eD6rwG
Malware Config
Extracted
lumma
Extracted
lumma
https://tenntysjuxmz.shop/api
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3876 Installer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7H8but7H6QRKvukmMR4kRGgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Installer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3876 Installer.exe 3876 Installer.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4764 wrote to memory of 3876 4764 7H8but7H6QRKvukmMR4kRGgs.exe 73 PID 4764 wrote to memory of 3876 4764 7H8but7H6QRKvukmMR4kRGgs.exe 73 PID 4764 wrote to memory of 3876 4764 7H8but7H6QRKvukmMR4kRGgs.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\7H8but7H6QRKvukmMR4kRGgs.exe"C:\Users\Admin\AppData\Local\Temp\7H8but7H6QRKvukmMR4kRGgs.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\Installer.exe"C:\Users\Admin\AppData\Local\Temp\Installer.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.9MB
MD5817f44286b0459791c466a16d876420a
SHA1de11b9291864275c58eb1f995a93f8c08a450de3
SHA2561dad07d6bfa9ecefe480b3dcb5f4d333e5ebb6b612cd370061cf6a8507b32564
SHA512762973ac4f96c91dd355797b2008dbc8c95702714e6678b7656533325d39497c154111b14316f221d6589325a011941a5ae9cdf3b55613e716df00b642a05a06