Analysis
-
max time kernel
101s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 16:46
Static task
static1
Behavioral task
behavioral1
Sample
2fa5c9b3973341bb4ae72c895bd2a550N.exe
Resource
win7-20240729-en
4 signatures
120 seconds
General
-
Target
2fa5c9b3973341bb4ae72c895bd2a550N.exe
-
Size
286KB
-
MD5
2fa5c9b3973341bb4ae72c895bd2a550
-
SHA1
01a662e1e8a00ff2fbe802d1d479ec6beb5d98b0
-
SHA256
2fcd09bbfac5cc99d930089a45b85e04e71dfa1cf75df14b14be18a7b68fabc4
-
SHA512
5f567b49174e9c4d68a7abe6553a07a22fafcee681af2e474ca1a6d5cc728ccd2560939acc1f14532c352fd5e92ca655157edd2ea13e0a7992eb65092fa4a91d
-
SSDEEP
6144:wl2XyAhSC7y3mHYHgRRH8QJv7ZwbULt8iNOYlyOETEO:hXyyu3mGgHcilwbULttNF0OETEO
Malware Config
Extracted
Family
lumma
C2
https://drinnkysoapmzv.shop/api
https://potentioallykeos.shop/api
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1520 set thread context of 4300 1520 2fa5c9b3973341bb4ae72c895bd2a550N.exe 85 -
Program crash 1 IoCs
pid pid_target Process procid_target 1564 4300 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2fa5c9b3973341bb4ae72c895bd2a550N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1520 wrote to memory of 2132 1520 2fa5c9b3973341bb4ae72c895bd2a550N.exe 84 PID 1520 wrote to memory of 2132 1520 2fa5c9b3973341bb4ae72c895bd2a550N.exe 84 PID 1520 wrote to memory of 2132 1520 2fa5c9b3973341bb4ae72c895bd2a550N.exe 84 PID 1520 wrote to memory of 4300 1520 2fa5c9b3973341bb4ae72c895bd2a550N.exe 85 PID 1520 wrote to memory of 4300 1520 2fa5c9b3973341bb4ae72c895bd2a550N.exe 85 PID 1520 wrote to memory of 4300 1520 2fa5c9b3973341bb4ae72c895bd2a550N.exe 85 PID 1520 wrote to memory of 4300 1520 2fa5c9b3973341bb4ae72c895bd2a550N.exe 85 PID 1520 wrote to memory of 4300 1520 2fa5c9b3973341bb4ae72c895bd2a550N.exe 85 PID 1520 wrote to memory of 4300 1520 2fa5c9b3973341bb4ae72c895bd2a550N.exe 85 PID 1520 wrote to memory of 4300 1520 2fa5c9b3973341bb4ae72c895bd2a550N.exe 85 PID 1520 wrote to memory of 4300 1520 2fa5c9b3973341bb4ae72c895bd2a550N.exe 85 PID 1520 wrote to memory of 4300 1520 2fa5c9b3973341bb4ae72c895bd2a550N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\2fa5c9b3973341bb4ae72c895bd2a550N.exe"C:\Users\Admin\AppData\Local\Temp\2fa5c9b3973341bb4ae72c895bd2a550N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:2132
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4300 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4300 -s 12363⤵
- Program crash
PID:1564
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 4300 -ip 43001⤵PID:1324