Analysis
-
max time kernel
93s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 09:02
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0VCartoonizer_Trial.exe
Resource
win7-20240903-en
windows7-x64
1 signatures
150 seconds
General
-
Target
0VCartoonizer_Trial.exe
-
Size
16.0MB
-
MD5
1491fde71a72c411941e4f457589e180
-
SHA1
302946889bb43538ad2c2d5a644123ad2fbbca69
-
SHA256
8dd53f8f2686cb3946bec35e46ff067ec4b94f789f48db0f823b1633ee39a633
-
SHA512
d21250b4d7065511d6df273f8d3bada1d56cc3a969c334062b6e8167faa06c099dbc8209cc7c423ba30bc53d93ff4329235151c8c26ac6a3f3eeed7335567424
-
SSDEEP
98304:yBRT9Dey62EBcIMghQ8OjuyenJaoWxJEbisDNGPhssr7Ut/QYIano2OUvDXWQyng:gp+DpSqQoWbE/5srTY5qROb
Malware Config
Extracted
Family
lumma
C2
https://greetycruthsuo.shop/api
https://condedqpwqm.shop/api
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3800 set thread context of 4168 3800 0VCartoonizer_Trial.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0VCartoonizer_Trial.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3800 wrote to memory of 4168 3800 0VCartoonizer_Trial.exe 92 PID 3800 wrote to memory of 4168 3800 0VCartoonizer_Trial.exe 92 PID 3800 wrote to memory of 4168 3800 0VCartoonizer_Trial.exe 92 PID 3800 wrote to memory of 4168 3800 0VCartoonizer_Trial.exe 92 PID 3800 wrote to memory of 4168 3800 0VCartoonizer_Trial.exe 92 PID 3800 wrote to memory of 4168 3800 0VCartoonizer_Trial.exe 92 PID 3800 wrote to memory of 4168 3800 0VCartoonizer_Trial.exe 92 PID 3800 wrote to memory of 4168 3800 0VCartoonizer_Trial.exe 92 PID 3800 wrote to memory of 4168 3800 0VCartoonizer_Trial.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\0VCartoonizer_Trial.exe"C:\Users\Admin\AppData\Local\Temp\0VCartoonizer_Trial.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4168
-