Analysis
-
max time kernel
8s -
max time network
10s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-08-2024 21:05
Static task
static1
General
-
Target
Apocalypse.exe
-
Size
393KB
-
MD5
3ce83cf49e0a79c3073bcc0ff5cca567
-
SHA1
0037d26ab9ed572bd5417105a10a14ce7a7148d8
-
SHA256
a9ca10cd5556de003a1d418f24bf52037148e6829b75e914922c557c957bb318
-
SHA512
89db1796ed283198b73dda9c541ae337ab261541b508606786c0068a85e3f0db4021c721a412f83162eefb04ccb91eb405cc9585fc7e889097bc58ddb65b59a6
-
SSDEEP
6144:whW7M6VBIrBrC3eSTbEYU2O4ctro9RzaKNgT5o0ff06rW5/T/AYq8c7sh+BBCoEO:FVmS/vbctroLu52/60/AYNcoO8oEO
Malware Config
Extracted
lumma
https://writerospzm.shop/api
https://deallerospfosu.shop/api
https://bassizcellskz.shop/api
https://mennyudosirso.shop/api
https://languagedscie.shop/api
https://complaintsipzzx.shop/api
https://quialitsuzoxm.shop/api
https://tenntysjuxmz.shop/api
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 548 set thread context of 1724 548 Apocalypse.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Apocalypse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 548 wrote to memory of 1724 548 Apocalypse.exe 91 PID 548 wrote to memory of 1724 548 Apocalypse.exe 91 PID 548 wrote to memory of 1724 548 Apocalypse.exe 91 PID 548 wrote to memory of 1724 548 Apocalypse.exe 91 PID 548 wrote to memory of 1724 548 Apocalypse.exe 91 PID 548 wrote to memory of 1724 548 Apocalypse.exe 91 PID 548 wrote to memory of 1724 548 Apocalypse.exe 91 PID 548 wrote to memory of 1724 548 Apocalypse.exe 91 PID 548 wrote to memory of 1724 548 Apocalypse.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\Apocalypse.exe"C:\Users\Admin\AppData\Local\Temp\Apocalypse.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4352,i,11391966286255097843,10588851088187498028,262144 --variations-seed-version --mojo-platform-channel-handle=4416 /prefetch:81⤵PID:1484