Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24/08/2024, 15:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
21b8ad2326ac8257a348632169f913d0N.exe
Resource
win7-20240704-en
4 signatures
120 seconds
General
-
Target
21b8ad2326ac8257a348632169f913d0N.exe
-
Size
268KB
-
MD5
21b8ad2326ac8257a348632169f913d0
-
SHA1
82f95a9388c43724c8f9c212bc760fb11e01a1b8
-
SHA256
768ee0a4a5e1919a82e432e605a8c525d4c82081b13595a8b1a612d38067d951
-
SHA512
32f87225250abe11d311609f75dc171b3acd1670f3a686de08f03bdf9672479dfe41adb1cbdba4f0d28d280cd4f61a9a39051fa02241ad9f5127a384c6785ba5
-
SSDEEP
6144:n4LNPX/wMMxO17+EcVDszbttfG69ckKmvxv0f/Nq:n4LJPwMMxa5cVDsP7fGLfWL
Malware Config
Extracted
Family
lumma
C2
https://twilightsizp.shop/api
https://potentioallykeos.shop/api
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1400 set thread context of 2628 1400 21b8ad2326ac8257a348632169f913d0N.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 21b8ad2326ac8257a348632169f913d0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1400 wrote to memory of 2628 1400 21b8ad2326ac8257a348632169f913d0N.exe 31 PID 1400 wrote to memory of 2628 1400 21b8ad2326ac8257a348632169f913d0N.exe 31 PID 1400 wrote to memory of 2628 1400 21b8ad2326ac8257a348632169f913d0N.exe 31 PID 1400 wrote to memory of 2628 1400 21b8ad2326ac8257a348632169f913d0N.exe 31 PID 1400 wrote to memory of 2628 1400 21b8ad2326ac8257a348632169f913d0N.exe 31 PID 1400 wrote to memory of 2628 1400 21b8ad2326ac8257a348632169f913d0N.exe 31 PID 1400 wrote to memory of 2628 1400 21b8ad2326ac8257a348632169f913d0N.exe 31 PID 1400 wrote to memory of 2628 1400 21b8ad2326ac8257a348632169f913d0N.exe 31 PID 1400 wrote to memory of 2628 1400 21b8ad2326ac8257a348632169f913d0N.exe 31 PID 1400 wrote to memory of 2628 1400 21b8ad2326ac8257a348632169f913d0N.exe 31 PID 1400 wrote to memory of 2628 1400 21b8ad2326ac8257a348632169f913d0N.exe 31 PID 1400 wrote to memory of 2628 1400 21b8ad2326ac8257a348632169f913d0N.exe 31 PID 1400 wrote to memory of 2628 1400 21b8ad2326ac8257a348632169f913d0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\21b8ad2326ac8257a348632169f913d0N.exe"C:\Users\Admin\AppData\Local\Temp\21b8ad2326ac8257a348632169f913d0N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2628
-