Analysis
-
max time kernel
135s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 02:06
Static task
static1
Behavioral task
behavioral1
Sample
cc4cc56bfa3300660baab1293ed6d80d12f0b7a2350bdacb0ab6971aa1cd6f57.exe
Resource
win7-20240704-en
General
-
Target
cc4cc56bfa3300660baab1293ed6d80d12f0b7a2350bdacb0ab6971aa1cd6f57.exe
-
Size
14.3MB
-
MD5
c3d9851113a89c40400c0ac454e4c1c4
-
SHA1
a02971f91b21079bb342ad00d6675583184a52f8
-
SHA256
cc4cc56bfa3300660baab1293ed6d80d12f0b7a2350bdacb0ab6971aa1cd6f57
-
SHA512
32c0029fd885cbad99143344580e6684d5e53e2652c8855feaf8d40a00192ddd517c1315a956cfd4102c0c4561f2de4cb78ec53f1a7ef2a3618f62e8a01ad725
-
SSDEEP
98304:PB+RFrTda3rckTrSij+ASw0uynrRv2MqGrTKDExwwA/rSLMv/Z:k81TrSiCa0uyrRv2MqGrTNx4/J
Malware Config
Extracted
lumma
https://disappointypsm.shop/api
https://writerospzm.shop/api
https://deallerospfosu.shop/api
https://bassizcellskz.shop/api
https://languagedscie.shop/api
https://complaintsipzzx.shop/api
https://quialitsuzoxm.shop/api
https://tenntysjuxmz.shop/api
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4912 set thread context of 3040 4912 cc4cc56bfa3300660baab1293ed6d80d12f0b7a2350bdacb0ab6971aa1cd6f57.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4912 wrote to memory of 3040 4912 cc4cc56bfa3300660baab1293ed6d80d12f0b7a2350bdacb0ab6971aa1cd6f57.exe 95 PID 4912 wrote to memory of 3040 4912 cc4cc56bfa3300660baab1293ed6d80d12f0b7a2350bdacb0ab6971aa1cd6f57.exe 95 PID 4912 wrote to memory of 3040 4912 cc4cc56bfa3300660baab1293ed6d80d12f0b7a2350bdacb0ab6971aa1cd6f57.exe 95 PID 4912 wrote to memory of 3040 4912 cc4cc56bfa3300660baab1293ed6d80d12f0b7a2350bdacb0ab6971aa1cd6f57.exe 95 PID 4912 wrote to memory of 3040 4912 cc4cc56bfa3300660baab1293ed6d80d12f0b7a2350bdacb0ab6971aa1cd6f57.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc4cc56bfa3300660baab1293ed6d80d12f0b7a2350bdacb0ab6971aa1cd6f57.exe"C:\Users\Admin\AppData\Local\Temp\cc4cc56bfa3300660baab1293ed6d80d12f0b7a2350bdacb0ab6971aa1cd6f57.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeC:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe2⤵
- System Location Discovery: System Language Discovery
PID:3040
-