Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
10-08-2024 16:35
Static task
static1
Behavioral task
behavioral1
Sample
7H8but7H6QRKvukmMR4kRGgs.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7H8but7H6QRKvukmMR4kRGgs.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
7H8but7H6QRKvukmMR4kRGgs.exe
Resource
win10v2004-20240802-en
General
-
Target
7H8but7H6QRKvukmMR4kRGgs.exe
-
Size
7.2MB
-
MD5
c096091896176545bc3aac5adb5f7aad
-
SHA1
d545971a44c2615f6e93e1e77fddd950a6ee773c
-
SHA256
b57280ff29b1bae4436d9f87cb929b1507831d2c91021945da5a66a001f58dfd
-
SHA512
231686d0678049c69eff7106a1a9d02b3321e209237eb777618bfa8403764f3464105b177a5d9bb3872b85fdfe2ea9affd631b925eb2552f0cba0443670ca3d8
-
SSDEEP
196608:PpyjvqOnGGXy+jPww/99k2xLjrvWAeD6HKM9wG:Pp09nGGt8w/99xxLj3eD6rwG
Malware Config
Extracted
lumma
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4164 Installer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7H8but7H6QRKvukmMR4kRGgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Installer.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4164 Installer.exe 4164 Installer.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4184 wrote to memory of 4164 4184 7H8but7H6QRKvukmMR4kRGgs.exe 82 PID 4184 wrote to memory of 4164 4184 7H8but7H6QRKvukmMR4kRGgs.exe 82 PID 4184 wrote to memory of 4164 4184 7H8but7H6QRKvukmMR4kRGgs.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\7H8but7H6QRKvukmMR4kRGgs.exe"C:\Users\Admin\AppData\Local\Temp\7H8but7H6QRKvukmMR4kRGgs.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\Installer.exe"C:\Users\Admin\AppData\Local\Temp\Installer.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.9MB
MD5817f44286b0459791c466a16d876420a
SHA1de11b9291864275c58eb1f995a93f8c08a450de3
SHA2561dad07d6bfa9ecefe480b3dcb5f4d333e5ebb6b612cd370061cf6a8507b32564
SHA512762973ac4f96c91dd355797b2008dbc8c95702714e6678b7656533325d39497c154111b14316f221d6589325a011941a5ae9cdf3b55613e716df00b642a05a06