Analysis
-
max time kernel
147s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2024 12:01
Static task
static1
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win7-20240704-en
General
-
Target
Loader.exe
-
Size
268KB
-
MD5
21b8ad2326ac8257a348632169f913d0
-
SHA1
82f95a9388c43724c8f9c212bc760fb11e01a1b8
-
SHA256
768ee0a4a5e1919a82e432e605a8c525d4c82081b13595a8b1a612d38067d951
-
SHA512
32f87225250abe11d311609f75dc171b3acd1670f3a686de08f03bdf9672479dfe41adb1cbdba4f0d28d280cd4f61a9a39051fa02241ad9f5127a384c6785ba5
-
SSDEEP
6144:n4LNPX/wMMxO17+EcVDszbttfG69ckKmvxv0f/Nq:n4LJPwMMxa5cVDsP7fGLfWL
Malware Config
Extracted
lumma
https://twilightsizp.shop/api
https://potentioallykeos.shop/api
https://interactiedovspm.shop/api
https://charecteristicdxp.shop/api
https://cagedwifedsozm.shop/api
https://deicedosmzj.shop/api
https://southedhiscuso.shop/api
https://consciousourwi.shop/api
https://tenntysjuxmz.shop/api
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1656 set thread context of 668 1656 Loader.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Loader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1656 wrote to memory of 668 1656 Loader.exe 92 PID 1656 wrote to memory of 668 1656 Loader.exe 92 PID 1656 wrote to memory of 668 1656 Loader.exe 92 PID 1656 wrote to memory of 668 1656 Loader.exe 92 PID 1656 wrote to memory of 668 1656 Loader.exe 92 PID 1656 wrote to memory of 668 1656 Loader.exe 92 PID 1656 wrote to memory of 668 1656 Loader.exe 92 PID 1656 wrote to memory of 668 1656 Loader.exe 92 PID 1656 wrote to memory of 668 1656 Loader.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\Loader.exe"C:\Users\Admin\AppData\Local\Temp\Loader.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4124,i,9445584274764997943,12714240264001792460,262144 --variations-seed-version --mojo-platform-channel-handle=4104 /prefetch:81⤵PID:2172